Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe
Analysis ID:1446236
MD5:98cc7dd8eeeaf079b8e8f650d847525f
SHA1:2f8bdb79155ce50f7b02209cd28f996fc9e62915
SHA256:5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contain functionality to detect virtual machines
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to detect sandboxes (mouse cursor move detection)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains an invalid checksum
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeReversingLabs: Detection: 68%
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeJoe Sandbox ML: detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00425784 __ehhandler$?_Swap@?$_Func_class@X$$V@std@@IAEXAAV12@@Z,__EH_prolog3_GS,CryptAcquireContextW,CryptAcquireContextW,CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,CryptReleaseContext,0_2_00425784
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00425835 CryptAcquireContextW,CryptAcquireContextW,CryptAcquireContextW,CloseHandle,CryptCreateHash,CryptReleaseContext,CryptHashData,CryptDestroyHash,ReadFile,CryptHashData,ReadFile,CryptDestroyHash,CryptReleaseContext,CloseHandle,CloseHandle,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptDestroyHash,CryptReleaseContext,0_2_00425835
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00425B69 __EH_prolog3_GS,CryptAcquireContextW,CryptAcquireContextW,CryptAcquireContextW,CryptCreateHash,CryptReleaseContext,CryptHashData,CryptDestroyHash,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,0_2_00425B69
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00426865 GetLogicalDriveStringsW,lstrlenW,QueryDosDeviceW,GetFullPathNameW,GetFullPathNameW,GetFullPathNameW,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,0_2_00426865
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00436131 __EH_prolog3,HttpOpenRequestW,GetLastError,HttpSendRequestW,GetLastError,InternetCloseHandle,InternetQueryOptionW,HttpQueryInfoA,WaitForSingleObject,HttpQueryInfoW,GetLastError,WriteFile,GetLastError,WaitForSingleObject,InternetReadFile,GetLastError,InternetCloseHandle,0_2_00436131
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004180310_2_00418031
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004120E00_2_004120E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0043C2380_2_0043C238
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004222C30_2_004222C3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004203010_2_00420301
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004444400_2_00444440
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0043B4090_2_0043B409
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004214810_2_00421481
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0043259A0_2_0043259A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0040F7300_2_0040F730
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0042B78D0_2_0042B78D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004208450_2_00420845
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004268650_2_00426865
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0041D86A0_2_0041D86A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0042EADB0_2_0042EADB
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0042CD5C0_2_0042CD5C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00420D890_2_00420D89
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00415E6E0_2_00415E6E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00430E1A0_2_00430E1A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00437E3B0_2_00437E3B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: String function: 00401916 appears 96 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: String function: 00410F30 appears 43 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: String function: 004126DD appears 87 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: String function: 00412746 appears 39 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: String function: 00415730 appears 45 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: String function: 004018B3 appears 58 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: String function: 00403C93 appears 48 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 488
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeBinary string: kernel32.dllIsWow64Process\device\mupShell32.dllSHGetKnownFolderPath\Downloads\User Pinned\TaskBar\Microsoft\Internet Explorer\Quick LaunchProgramFilesDirSOFTWARE\Microsoft\Windows\CurrentVersion\cmd.exeComSpec" exit" & if not exist " & for /l %x in (1,1,60) do ping 127.0.0.1 -n 2 -w 500 & del /q /f "" /c taskkill /f /pid 0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789abcdef0123456789abcdefhlPxjHRu9UWCOtTORdZ51F7RYWUCWy731OtU3OaRC1xO5rErBozbP4G2hNm67mUHhghf659f453e18e0508fd502a51ca0138091b7e80eSELECT * FROM WQLtruefalse
Source: classification engineClassification label: mal56.evad.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00423319 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,0_2_00423319
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00438D35 GetLogicalDriveStringsW,GetDriveTypeW,GetDiskFreeSpaceExW,0_2_00438D35
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00426FD8 CreateToolhelp32Snapshot,_memset,Process32FirstW,GetLastError,CloseHandle,OpenProcess,GetProcessTimes,GetProcessImageFileNameW,CharLowerW,CloseHandle,CharLowerW,Process32NextW,GetLastError,CloseHandle,0_2_00426FD8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00426181 CoInitializeEx,CoCreateInstance,CoSetProxyBlanket,VariantClear,0_2_00426181
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3076
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\02a083e5-98b2-45c0-8703-1f8c164790f5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCommand line argument: :tmp0_2_004351F9
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCommand line argument: .tmp0_2_004351F9
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeReversingLabs: Detection: 68%
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeString found in binary or memory: /launch_install?error=
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeString found in binary or memory: /launch_install?name=
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeString found in binary or memory: /launch_info
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeString found in binary or memory: /launch_error?text=
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeString found in binary or memory: ,products=closed/close_install?checks2,unchecked=products2=unchecked2=/unchecked_install?products=/unchecked_install?products2=/launch_infoinstaller not founderror opening file installer file #error getting length of installer binary fileerror reading installer binary filereaded 0 bytes from installer binary file:Zone.Identifierwatchstartparent=
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeString found in binary or memory: /launch_error?text=&launch=&?launch=": url error in "torrentwhsciconSTATICIconopenBUTTON
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeString found in binary or memory: $__HASHHASH$__MIXinstall=&hash=/touch_install?name=) (error=&md5=/launch_install?error=can't install success=/launch_install?name=&check=delay time=/delay?time=Wrong PE fileWrong PE signatureNot normal PE formaterror allocating virtual memoryerror creating executable heaperror allocating executable memoryunknown relocationcan't create thread
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 488
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004230F3 LoadLibraryW,GetProcAddress,0_2_004230F3
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeStatic PE information: real checksum: 0x60c79 should be: 0x60a47
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00415775 push ecx; ret 0_2_00415788
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004127B5 push ecx; ret 0_2_004127C8
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: vmware qemu qemu 0_2_0043A8D8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: GetCommandLineW,ExitProcess,GetCursorPos,GetCursorPos,Sleep,GetCursorPos,_memset,CreatePipe,WriteFile,WriteFile,WriteFile,GetStdHandle,GetStdHandle,GetStdHandle,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,_memset,GetStdHandle,GetStdHandle,GetStdHandle,CreateProcessW,CloseHandle,CloseHandle,CloseHandle,0_2_0043545F
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-32588
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeAPI coverage: 1.9 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00426865 GetLogicalDriveStringsW,lstrlenW,QueryDosDeviceW,GetFullPathNameW,GetFullPathNameW,GetFullPathNameW,GetLongPathNameW,GetLongPathNameW,GetLongPathNameW,0_2_00426865
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00438BF9 __ehhandler$?_Initialize@SchedulerPolicy@Concurrency@@AAEXIPAPAD@Z,__EH_prolog3,GetSystemInfo,CallNtPowerInformation,0_2_00438BF9
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeBinary or memory string: vmware
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeBinary or memory string: nsystemFSOSantivirusantispywarefirewallbrowsersvideoregistryregistryFilegetLineisFileisDirisRegistryfileTimeisInstalledmemoryharddiskprocessorisAdminis64bitVMmanufacturerbaseBoarddiskDrivesfileAssocdisplayvirtDisplayNET:.win;sp;suite:;product:AntivirusProductAntiSpywareProductFirewallProducthttpSoftware\Clients\StartMenuInternetSoftware\Clients\StartMenuInternet\\shell\open\command |nameWin32_VideoControllerROOT\CIMv2\/*\1SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallDisplayName\modelvirtualboxvmwareparallelsqemuwinevirtualWin32_ComputerSystemproductWin32_BaseBoardcaptionWin32_DiskDriveopenxSOFTWARE\Microsoft\NET Framework Setup\NDPVersionSOFTWARE\Microsoft\NET Framework Setup\NDP\error getting versionInstallversion not installedSPsp\Full\Clientmap/set<T> too longvector<T> too longinvalid map/set<T> iterator
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00411360 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00411360
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004230F3 LoadLibraryW,GetProcAddress,0_2_004230F3
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00428340 mov eax, dword ptr fs:[00000030h]0_2_00428340
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00428340 mov eax, dword ptr fs:[00000030h]0_2_00428340
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00429751 mov eax, dword ptr fs:[00000030h]0_2_00429751
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00429751 mov eax, dword ptr fs:[00000030h]0_2_00429751
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00429751 mov eax, dword ptr fs:[00000030h]0_2_00429751
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0042C16E __ehhandler$?enable_segment@_Helper@_Concurrent_vector_base_v4@details@Concurrency@@SAIAAV234@II@Z,__EH_prolog3,SetErrorMode,SetUnhandledExceptionFilter,GetStdHandle,ReadFile,ReadFile,0_2_0042C16E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00417277 SetUnhandledExceptionFilter,0_2_00417277
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00411360 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00411360
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0043259A GetTickCount,SetErrorMode,SetUnhandledExceptionFilter,InitializeCriticalSection,InitializeCriticalSection,InitializeCriticalSection,CoInitializeEx,CreateEventW,CreateEventW,CreateEventW,CreateEventW,GdiplusStartup,IsUserAnAdmin,GetModuleHandleW,EnumResourceNamesW,GetFileSizeEx,CreateThread,InitCommonControlsEx,GetTickCount,MessageBoxW,WaitForSingleObject,ResetEvent,CreateThread,WaitForSingleObject,CloseHandle,GdiplusShutdown,EnterCriticalSection,EnterCriticalSection,SetEvent,LeaveCriticalSection,CloseHandle,GetCurrentThreadId,CreateThread,EnterCriticalSection,CreateThread,LeaveCriticalSection,GetTickCount,EnterCriticalSection,LeaveCriticalSection,GetTickCount,EnterCriticalSection,CreateThread,LeaveCriticalSection,SetEvent,CloseHandle,CloseHandle,KillTimer,KillTimer,KillTimer,WaitForMultipleObjects,WaitForSingleObject,CloseHandle,GdiplusShutdown,0_2_0043259A
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00429737 SetUnhandledExceptionFilter,ExitProcess,0_2_00429737
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004127E7 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004127E7
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00410F21 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00410F21
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_00422F0E cpuid 0_2_00422F0E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: GetLocaleInfoA,0_2_00419F6E
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_004177B1 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004177B1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exeCode function: 0_2_0043902A __EH_prolog3_GS,_memset,GetVersionExW,0_2_0043902A
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts3
Command and Scripting Interpreter
1
DLL Side-Loading
1
Access Token Manipulation
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
2
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Native API
Boot or Logon Initialization Scripts1
Process Injection
1
Access Token Manipulation
LSASS Memory141
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
1
Process Injection
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Deobfuscate/Decode Files or Information
NTDS1
Process Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials1
File and Directory Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync25
System Information Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe68%ReversingLabsWin32.Trojan.Generic
SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1446236
Start date and time:2024-05-23 01:30:22 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 44s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:11
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe
Detection:MAL
Classification:mal56.evad.winEXE@2/5@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 3
  • Number of non-executed functions: 133
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.22
  • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe
TimeTypeDescription
19:31:43API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8728362306142596
Encrypted:false
SSDEEP:96:rvUFsM5fKs8huzFXefhQXIDcQvc6QcEVcw3cE/f+HbHgnoW6HeE7snL9tjo2fn2l:r8dRKqt0BU/4jnZrsMqzuiFIZ24IO8u
MD5:E04350460002F9A95B05460D96F89396
SHA1:EFDC24F9BA1984EF7E1AB78B147DCBBA9D24A7AC
SHA-256:6014FD72A4B39B2CBD35B835B6D80D9EFDBEB2790790C3181BD0215F53B039A7
SHA-512:0C52BBD557F72FD5F9F09EF9C69E57C35C60949D6EBA9E897DD237504EE3D221EEB3980E1038E45F3465D4B2CFEC96E7C5FCFA1A01849769E8B6BB62E405BFF9
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.0.8.9.4.2.9.8.0.5.1.4.8.4.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.0.8.9.4.2.9.8.4.1.0.8.5.6.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.1.f.4.1.5.c.1.-.8.3.d.4.-.4.4.d.c.-.a.0.9.4.-.c.c.4.8.e.e.5.b.9.7.6.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.8.b.a.1.3.7.2.-.2.5.f.2.-.4.5.2.1.-.b.5.9.b.-.6.f.6.6.c.9.e.5.8.e.4.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...L.o.a.d.M.o.n.e.y...1.0.8.5...1.0.2.0.5...7.2.7.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.0.4.-.0.0.0.1.-.0.0.1.3.-.9.3.8.1.-.d.a.3.0.a.0.a.c.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.9.f.1.5.4.f.a.d.1.e.b.0.c.5.1.8.7.6.4.a.f.d.9.0.8.8.a.1.9.a.a.d.0.0.0.0.f.f.f.f.!.0.0.0.0.2.f.8.b.d.b.7.9.1.5.5.c.e.5.0.f.7.b.0.2.2.0.9.c.d.2.8.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Wed May 22 23:31:38 2024, 0x1205a4 type
Category:dropped
Size (bytes):36800
Entropy (8bit):2.007609435064957
Encrypted:false
SSDEEP:192:EdJrAMbZyB+mKOUOW77zmIwm/ggziWg8MvBFVq1XOqaOZn20:OJrrNMjXSzqMZM5FAOqa+
MD5:FCDDA76E63952B0929B45B75074B2DC2
SHA1:17A010C01258CD8C461201C399507A10A31E44DF
SHA-256:AC9F7845F4CAD79E044D1DEBC0710F36CB272EC276A15E82FF81EE09CF8EFC08
SHA-512:968293156F8B440C70DA463D77509B1426FB9D4AEBEC0B04B4AC066E2B30ACFE5D0907C1B1DFF5400BACD4F9F4FA283862A76FFC4F5F591D107667951A775735
Malicious:false
Reputation:low
Preview:MDMP..a..... .......Z.Nf.........................................%..........T.......8...........T........... ....|..........H...........4...............................................................................eJ..............GenuineIntel............T...........Y.Nf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8464
Entropy (8bit):3.7035225480837717
Encrypted:false
SSDEEP:192:R6l7wVeJCv6sr6YWfSU9Dfgmfk0SLprw89bDYsfjhm:R6lXJi6sr6YuSU9Dfgmfk0SLDLf4
MD5:D61319F39A438E354A3D3B4E44B2FC43
SHA1:F3D7C72BC894FBF23A3766A81A870E797D1C9340
SHA-256:7E5C6C978A5C2F06332ADDFC919D10B3D49AB4500F3CA1BAAE501654A8307A68
SHA-512:EADF0DCD9356F9F0B50EA8E5F655211E8E96B50D3E656093AD2B14CD7C5FC82481D7F655AAE18F725AF915F277A8AA4402247C0CEE080D0D846590D93FD6BECE
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.0.7.6.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4790
Entropy (8bit):4.561588191050228
Encrypted:false
SSDEEP:48:cvIwWl8zsoNJg77aI9mrVWpW8VY+Ym8M4JROA9FTL3P+q82P+5YDY2d:uIjfMI7oI7VSJzkSs2d
MD5:75011462992D6AE1C8D921FE83EE0E30
SHA1:0B065C2BD61E529861420FB5E27830B8BE5EBC2D
SHA-256:937170E934E2A747D096998041DB7D48603822CB19EC350279B62104742F04DA
SHA-512:A74D0283139C0947ABD3F525C2BBC02A76CFE9835BA1449DCEE160D29997CE8160812342C3623CCC7B15230BE3BB0F2EFA55180DEFDFF4063DD5147AAA2F9B96
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="334954" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.295922598257211
Encrypted:false
SSDEEP:6144:441fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+HGmBMZJh1VjF:11/YCW2AoQ0NiBGwMHrVZ
MD5:65B443CF0677BB4FB47CC774C0322A74
SHA1:A2F1A9D4DBE1BA80F19AFA2D16347410DCA54851
SHA-256:723F052BED1ED0A8AA5A2AC120525470314FA59192EFAC70F64D3241098CCFEF
SHA-512:EBA5A064A11816BDF26994CA63E26D2C240D395E0907BAF0A56F5155642E4A0F4579B0DB4FFC28BC0DDDA8FA39114FDDC90215E3BBA27DB1FBC19AE4AEE024A8
Malicious:false
Reputation:low
Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.Q.1............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.425136010677569
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe
File size:386'048 bytes
MD5:98cc7dd8eeeaf079b8e8f650d847525f
SHA1:2f8bdb79155ce50f7b02209cd28f996fc9e62915
SHA256:5b9cb6ebd3779665272eb9303004faf88f121cbe8f7e63c00a547e6d9ae13998
SHA512:24de92368cf508ac40db171f891075c67a90d71fa9febefc8cce4218c4d248870dcca240347e7bfc39b66a52477c3b0b9b9cd0fe478fafd226ce092147b2a92f
SSDEEP:6144:4i4TBXZh3Am19Lk/8LS35qQkOLwfFGIMcPayeMlTDIeuhDF28VBUJpEzubg66:4isBXZh3Amr4/8YN9Lw4izIeuhDF28Vh
TLSH:2D849E12B745F032C4130171BA19A3B6823DB9716B398187B3D85F6EEEF16D27939B42
File Content Preview:MZ......................@...`r...................r......................!..L.!This program cannot be run in DOS mode....$.........L..u"..u"..u"......u"......u".....lu"...O..u"...Y..u"..u#..t"......u"......u"......u".Rich.u"...?.....PE..L...X..V...........
Icon Hash:03e1565848481a3e
Entrypoint:0x411b23
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
Time Stamp:0x561CF058 [Tue Oct 13 11:51:52 2015 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:8765057780dde950993dc56a99702829
Instruction
call 00007F4EF491F9CEh
jmp 00007F4EF4919BBEh
int3
int3
int3
cmp dword ptr [00458030h], 00000000h
je 00007F4EF491FA64h
sub esp, 08h
stmxcsr dword ptr [esp+04h]
mov eax, dword ptr [esp+04h]
and eax, 00001F80h
cmp eax, 00001F80h
jne 00007F4EF4919D51h
fstcw word ptr [esp]
mov ax, word ptr [esp]
and ax, 007Fh
cmp ax, 007Fh
lea esp, dword ptr [esp+08h]
jne 00007F4EF491FA33h
jmp 00007F4EF4919D42h
movq xmm0, qword ptr [esp+04h]
movapd xmm2, dqword ptr [004447C0h]
movapd xmm3, xmm0
movapd xmm1, xmm0
movapd xmm4, xmm0
movapd xmm6, xmm0
psllq xmm0, 01h
psrlq xmm0, 35h
psrlq xmm3, 34h
andpd xmm4, dqword ptr [004447D0h]
movd eax, xmm0
psubd xmm2, xmm0
mov ecx, dword ptr [esp+0Ch]
psrlq xmm1, xmm2
psllq xmm1, xmm2
movd edx, xmm3
cmp eax, 000003FFh
jl 00007F4EF4919D60h
cmp eax, 00000432h
jnle 00007F4EF4919D62h
movq qword ptr [ecx], xmm1
subsd xmm6, xmm1
orpd xmm6, xmm4
movq qword ptr [esp+04h], xmm6
fld qword ptr [esp+04h]
ret
movq qword ptr [ecx], xmm4
fld qword ptr [esp+04h]
Programming Language:
  • [ASM] VS2008 SP1 build 30729
  • [C++] VS2008 SP1 build 30729
  • [ C ] VS2008 SP1 build 30729
  • [ C ] VS2005 build 50727
  • [IMP] VS2005 build 50727
  • [LNK] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x52e640x140.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x5a0000x4028.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x5f0000x0.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x440000x43c.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x4252b0x42600157e0f1d68cb70fce7efeadfb4906c21False0.530404013653484data6.582694661440288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x440000x106600x108006f4e83ef0b02b76a70997b70cc098204False0.3940133759469697data4.903645653152718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x550000x41880x1c008b998369db83f67882398c0e74ebd57eFalse0.3588169642857143data3.767074441607386IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x5a0000x40280x4200e4296c6bc6d208dca5934d7351c48b2dFalse0.5220170454545454data5.7759752035222185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x5f0000x53200x540085d3b064f6d049f7daa79e59a7dffe81False0.5010230654761905data5.313122944050481IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x5a1480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RussianRussia0.5283195020746888
RT_ICON0x5c6f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RussianRussia0.6083489681050657
RT_ICON0x5d7980x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RussianRussia0.42021276595744683
RT_GROUP_ICON0x5dc000x30dataRussianRussia0.8541666666666666
RT_MANIFEST0x5dc300x3f7ASCII text, with very long lines (1015), with no line terminatorsEnglishUnited States0.4896551724137931
DLLImport
KERNEL32.dllCreatePipe, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, VirtualAlloc, HeapCreate, LoadLibraryA, GetProcAddress, HeapAlloc, ExitThread, LocalFree, lstrlenW, GetTempPathW, LoadLibraryW, GetCurrentProcess, QueryDosDeviceW, GetFullPathNameW, GetLongPathNameW, GetModuleFileNameW, GetEnvironmentVariableW, GetCurrentProcessId, MoveFileExW, ExpandEnvironmentStringsW, WideCharToMultiByte, MultiByteToWideChar, GetFileAttributesW, GetVersion, CreateSemaphoreW, ReleaseSemaphore, GetFileInformationByHandle, CopyFileW, DeleteFileW, IsBadWritePtr, CreateFileW, SetFilePointer, CreateToolhelp32Snapshot, Process32FirstW, OpenProcess, GetProcessTimes, Process32NextW, GetCommandLineW, GetExitCodeThread, InterlockedExchange, DeleteCriticalSection, GetFileSizeEx, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, GetProcessHeap, SetEndOfFile, FlushFileBuffers, GetConsoleMode, GetConsoleCP, SetStdHandle, InitializeCriticalSectionAndSpinCount, GetModuleHandleA, GetStringTypeW, GetStringTypeA, GetLocaleInfoA, IsValidCodePage, GetOEMCP, GetACP, QueryPerformanceCounter, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetStartupInfoA, GetFileType, SetHandleCount, GetModuleFileNameA, HeapReAlloc, VirtualFree, GetFileSize, ReadFile, GetStdHandle, ExitProcess, WaitForMultipleObjects, GetCurrentThreadId, LeaveCriticalSection, SetEvent, EnterCriticalSection, ResetEvent, SetProcessShutdownParameters, CreateThread, HeapSize, SetLastError, TlsFree, TlsSetValue, TerminateProcess, TlsAlloc, TlsGetValue, GetCPInfo, LCMapStringW, LCMapStringA, RtlUnwind, RaiseException, GetStartupInfoW, HeapFree, IsDebuggerPresent, UnhandledExceptionFilter, GetModuleHandleW, EnumResourceNamesW, InitializeCriticalSection, CreateEventW, SetUnhandledExceptionFilter, SetErrorMode, GetTickCount, CreateProcessW, SetFileAttributesW, WriteFile, WaitForSingleObject, Sleep, GetLastError, GetSystemInfo, GetDiskFreeSpaceExW, GetDriveTypeW, GetLogicalDriveStringsW, GlobalMemoryStatusEx, GetSystemTimeAsFileTime, CloseHandle, GetFileTime, GetVersionExW, GetVolumeInformationW, GetVolumePathNameW, GetSystemDirectoryW, CreateFileA, InterlockedDecrement, InterlockedIncrement
USER32.dllDrawIconEx, GetSysColorBrush, EndPaint, RedrawWindow, LoadImageW, BeginPaint, GetSysColor, SetTimer, EnableWindow, GetForegroundWindow, ShowWindow, DestroyWindow, FlashWindow, AttachThreadInput, SetCursor, CharLowerW, PostMessageW, GetCursorPos, KillTimer, MessageBoxW, LoadCursorW, GetSystemMetrics, ReleaseDC, GetDC, SetRect, SetFocus, DefWindowProcW, LoadStringW, SendMessageW, RegisterClassExW, CreateWindowExW, GetMessageW, DispatchMessageW, AdjustWindowRectEx, SetParent, IsDialogMessageW, TranslateMessage, SetWindowTextW, SetWindowPos, PostQuitMessage, SetWindowLongW, GetWindowLongW
GDI32.dllSetDIBitsToDevice, StretchBlt, BitBlt, CreateFontIndirectW, GetStockObject, GetObjectW, SelectObject, CreateBitmap, CreateCompatibleDC, GetDeviceCaps, StretchDIBits
gdiplus.dllGdipDeleteGraphics, GdipDeleteBrush, GdipDrawImageRectI, GdipFillRectangleI, GdipCreateSolidFill, GdipCreateFromHDC, GdipGetImageWidth, GdipLoadImageFromStream, GdiplusShutdown, GdiplusStartup, GdipDisposeImage, GdipGetImageHeight
SHLWAPI.dllStrCpyW, AssocQueryStringW, PathCreateFromUrlW
COMCTL32.dllInitCommonControlsEx
COMDLG32.dllGetSaveFileNameW
ADVAPI32.dllGetNamedSecurityInfoW, SetNamedSecurityInfoW, AdjustTokenPrivileges, LookupPrivilegeValueW, CopySid, GetLengthSid, GetTokenInformation, OpenProcessToken, RegEnumKeyExW, RegQueryInfoKeyW, RegSetValueExW, RegCreateKeyExW, RegCloseKey, RegQueryValueExW, RegOpenKeyExW, CryptGenRandom, CryptGetHashParam, CryptDestroyHash, CryptHashData, CryptReleaseContext, CryptCreateHash, CryptAcquireContextW, EqualSid
SHELL32.dllShellExecuteW, SHOpenFolderAndSelectItems, SHGetFolderPathW
ole32.dllOleSetContainedObject, OleCreate, CoSetProxyBlanket, CoTaskMemFree, GetHGlobalFromStream, CreateStreamOnHGlobal, CoUninitialize, CoCreateInstance, CoInitializeEx, OleLockRunning
OLEAUT32.dllVariantClear, VariantInit, SysFreeString, SysAllocString
WININET.dllHttpOpenRequestW, HttpSendRequestW, InternetQueryOptionW, InternetCloseHandle, HttpQueryInfoW, InternetReadFile, InternetConnectW, InternetSetOptionW, InternetOpenW, HttpQueryInfoA
POWRPROF.dllCallNtPowerInformation
VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
PSAPI.DLLGetProcessImageFileNameW
Language of compilation systemCountry where language is spokenMap
RussianRussia
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:19:31:37
Start date:22/05/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.LoadMoney.1085.10205.7276.exe"
Imagebase:0x400000
File size:386'048 bytes
MD5 hash:98CC7DD8EEEAF079B8E8F650D847525F
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:19:31:37
Start date:22/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 488
Imagebase:0x520000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:0.6%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:1%
    Total number of Nodes:205
    Total number of Limit Nodes:7
    execution_graph 32453 4119a6 32491 415730 32453->32491 32455 4119b2 GetStartupInfoW 32457 4119d5 32455->32457 32492 415791 HeapCreate 32457->32492 32459 411a25 32494 4151c5 GetModuleHandleW 32459->32494 32463 411a36 __RTC_Initialize 32528 416c82 32463->32528 32466 411a44 32467 411a50 GetCommandLineW 32466->32467 32577 415425 61 API calls 3 library calls 32466->32577 32543 417708 GetEnvironmentStringsW 32467->32543 32470 411a4f 32470->32467 32471 411a5f 32550 41765a GetModuleFileNameW 32471->32550 32474 411a74 32556 41742b 32474->32556 32478 411a85 32569 4154e4 32478->32569 32481 411a8c 32482 411a97 __wwincmdln 32481->32482 32580 415425 61 API calls 3 library calls 32481->32580 32484 411aa2 32482->32484 32581 4351f9 107 API calls 3 library calls 32484->32581 32486 411ab8 32487 411ac6 32486->32487 32582 415695 61 API calls _doexit 32486->32582 32583 4156c1 61 API calls _doexit 32487->32583 32490 411acb __freefls@4 32491->32455 32493 411a19 32492->32493 32493->32459 32575 41197d 61 API calls 3 library calls 32493->32575 32495 4151e0 32494->32495 32496 4151d9 32494->32496 32498 415348 32495->32498 32499 4151ea GetProcAddress GetProcAddress GetProcAddress GetProcAddress 32495->32499 32584 4153f5 Sleep GetModuleHandleW 32496->32584 32606 414edf 64 API calls 2 library calls 32498->32606 32502 415233 TlsAlloc 32499->32502 32501 4151df 32501->32495 32504 411a2b 32502->32504 32505 415281 TlsSetValue 32502->32505 32504->32463 32576 41197d 61 API calls 3 library calls 32504->32576 32505->32504 32506 415292 32505->32506 32585 4156df 6 API calls 4 library calls 32506->32585 32508 415297 32586 414db5 TlsGetValue 32508->32586 32511 414db5 __encode_pointer 6 API calls 32512 4152b2 32511->32512 32513 414db5 __encode_pointer 6 API calls 32512->32513 32514 4152c2 32513->32514 32515 414db5 __encode_pointer 6 API calls 32514->32515 32516 4152d2 32515->32516 32596 4157c1 InitializeCriticalSectionAndSpinCount __mtinitlocknum 32516->32596 32518 4152df 32518->32498 32597 414e30 6 API calls __crt_waiting_on_module_handle 32518->32597 32520 4152f3 32520->32498 32598 4136aa 32520->32598 32524 415326 32524->32498 32525 41532d 32524->32525 32605 414f1c 61 API calls 5 library calls 32525->32605 32527 415335 GetCurrentThreadId 32527->32504 32635 415730 32528->32635 32530 416c8e GetStartupInfoA 32531 4136aa __calloc_crt 61 API calls 32530->32531 32537 416caf 32531->32537 32532 416ecd __freefls@4 32532->32466 32533 416e4a GetStdHandle 32538 416e14 32533->32538 32534 4136aa __calloc_crt 61 API calls 32534->32537 32535 416eaf SetHandleCount 32535->32532 32536 416e5c GetFileType 32536->32538 32537->32532 32537->32534 32537->32538 32540 416d97 32537->32540 32538->32532 32538->32533 32538->32535 32538->32536 32637 41b619 InitializeCriticalSectionAndSpinCount __freefls@4 32538->32637 32539 416dc0 GetFileType 32539->32540 32540->32532 32540->32538 32540->32539 32636 41b619 InitializeCriticalSectionAndSpinCount __freefls@4 32540->32636 32544 417719 32543->32544 32546 41771d 32543->32546 32544->32471 32545 417730 32638 413665 61 API calls _malloc 32545->32638 32546->32545 32546->32546 32548 41773e _realloc 32549 417745 FreeEnvironmentStringsW 32548->32549 32549->32471 32551 41768f _wparse_cmdline 32550->32551 32552 411a69 32551->32552 32553 4176cc 32551->32553 32552->32474 32578 415425 61 API calls 3 library calls 32552->32578 32639 413665 61 API calls _malloc 32553->32639 32555 4176d2 _wparse_cmdline 32555->32552 32557 417443 _wcslen 32556->32557 32561 411a7a 32556->32561 32558 4136aa __calloc_crt 61 API calls 32557->32558 32564 417467 _wcslen 32558->32564 32559 4174cc 32642 4114be 61 API calls 2 library calls 32559->32642 32561->32478 32579 415425 61 API calls 3 library calls 32561->32579 32562 4136aa __calloc_crt 61 API calls 32562->32564 32563 4174f2 32643 4114be 61 API calls 2 library calls 32563->32643 32564->32559 32564->32561 32564->32562 32564->32563 32567 4174b1 32564->32567 32640 41d70e 61 API calls __vsprintf_s_l 32564->32640 32567->32564 32641 411360 10 API calls 3 library calls 32567->32641 32571 4154f2 __IsNonwritableInCurrentImage 32569->32571 32644 41b2d0 32571->32644 32572 415510 __initterm_e 32574 41552f __IsNonwritableInCurrentImage __initterm 32572->32574 32648 41133a 72 API calls __cinit 32572->32648 32574->32481 32575->32459 32576->32463 32577->32470 32578->32474 32579->32478 32580->32482 32581->32486 32582->32487 32583->32490 32584->32501 32585->32508 32587 414dcd 32586->32587 32588 414dee GetModuleHandleW 32586->32588 32587->32588 32589 414dd7 TlsGetValue 32587->32589 32590 414e09 GetProcAddress 32588->32590 32591 414dfe 32588->32591 32594 414de2 32589->32594 32593 414de6 32590->32593 32607 4153f5 Sleep GetModuleHandleW 32591->32607 32593->32511 32594->32588 32594->32593 32595 414e04 32595->32590 32595->32593 32596->32518 32597->32520 32601 4136b3 32598->32601 32600 4136f0 32600->32498 32604 414e30 6 API calls __crt_waiting_on_module_handle 32600->32604 32601->32600 32602 4136d1 Sleep 32601->32602 32608 41a38d 32601->32608 32603 4136e6 32602->32603 32603->32600 32603->32601 32604->32524 32605->32527 32606->32504 32607->32595 32609 41a399 __freefls@4 32608->32609 32610 41a3d0 _memset 32609->32610 32611 41a3b1 32609->32611 32614 41a442 HeapAlloc 32610->32614 32615 41a3c6 __freefls@4 32610->32615 32623 41593d 32610->32623 32630 41614f 5 API calls 2 library calls 32610->32630 32631 41a489 LeaveCriticalSection _doexit 32610->32631 32632 4148b1 6 API calls __decode_pointer 32610->32632 32621 4137d8 61 API calls __getptd_noexit 32611->32621 32613 41a3b6 32622 411488 6 API calls 2 library calls 32613->32622 32614->32610 32615->32601 32621->32613 32624 415952 32623->32624 32625 415965 EnterCriticalSection 32623->32625 32633 41587a 61 API calls 8 library calls 32624->32633 32625->32610 32627 415958 32627->32625 32634 415425 61 API calls 3 library calls 32627->32634 32629 415964 32629->32625 32630->32610 32631->32610 32632->32610 32633->32627 32634->32629 32635->32530 32636->32540 32637->32538 32638->32548 32639->32555 32640->32564 32641->32567 32642->32561 32643->32561 32646 41b2d6 32644->32646 32645 414db5 __encode_pointer 6 API calls 32645->32646 32646->32645 32647 41b2ee 32646->32647 32647->32572 32648->32574 32649 419c2c 32652 419a91 32649->32652 32651 419c3b 32653 419a9d __freefls@4 32652->32653 32682 41507c 32653->32682 32657 419ab0 32699 419830 71 API calls _LocaleUpdate::_LocaleUpdate 32657->32699 32659 419abb 32660 419ac7 32659->32660 32661 419c1e __freefls@4 32659->32661 32700 413665 61 API calls _malloc 32660->32700 32661->32651 32663 419ad1 32663->32661 32701 4198ac 74 API calls 6 library calls 32663->32701 32665 419af4 32666 419bfd 32665->32666 32672 419b01 32665->32672 32666->32661 32667 419c10 32666->32667 32705 4114be 61 API calls 2 library calls 32666->32705 32706 4137d8 61 API calls __getptd_noexit 32667->32706 32669 419b22 InterlockedIncrement 32669->32661 32671 419b38 32669->32671 32671->32661 32675 41593d __lock 61 API calls 32671->32675 32672->32669 32702 4114be 61 API calls 2 library calls 32672->32702 32673 419bf0 32673->32661 32678 419b4c 32675->32678 32676 419b21 32676->32669 32677 419bdb InterlockedIncrement 32704 419bf2 LeaveCriticalSection _doexit 32677->32704 32678->32677 32703 4114be 61 API calls 2 library calls 32678->32703 32681 419bda 32681->32677 32707 415003 GetLastError 32682->32707 32684 415084 32685 415091 32684->32685 32722 415425 61 API calls 3 library calls 32684->32722 32687 41978c 32685->32687 32688 419798 __freefls@4 32687->32688 32689 41507c __getptd 61 API calls 32688->32689 32690 41979d 32689->32690 32691 41593d __lock 61 API calls 32690->32691 32692 4197af 32690->32692 32697 4197cd 32691->32697 32694 4197bd __freefls@4 32692->32694 32732 415425 61 API calls 3 library calls 32692->32732 32693 4197fd 32734 419827 LeaveCriticalSection _doexit 32693->32734 32694->32657 32697->32693 32733 4114be 61 API calls 2 library calls 32697->32733 32699->32659 32700->32663 32701->32665 32702->32676 32703->32681 32704->32673 32705->32667 32706->32673 32723 414eab TlsGetValue 32707->32723 32710 415070 SetLastError 32710->32684 32711 4136aa __calloc_crt 58 API calls 32712 41502e 32711->32712 32712->32710 32713 415036 32712->32713 32728 414e30 6 API calls __crt_waiting_on_module_handle 32713->32728 32715 415048 32716 415067 32715->32716 32717 41504f 32715->32717 32730 4114be 61 API calls 2 library calls 32716->32730 32729 414f1c 61 API calls 5 library calls 32717->32729 32720 415057 GetCurrentThreadId 32720->32710 32721 41506d 32721->32710 32722->32685 32724 414ec0 32723->32724 32725 414edb 32723->32725 32731 414e30 6 API calls __crt_waiting_on_module_handle 32724->32731 32725->32710 32725->32711 32727 414ecb TlsSetValue 32727->32725 32728->32715 32729->32720 32730->32721 32731->32727 32732->32694 32733->32693 32734->32692

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 41978c-4197a7 call 415730 call 41507c 5 4197c6-4197de call 41593d 0->5 6 4197a9-4197ad 0->6 11 4197e0-4197e2 5->11 12 419816-419822 call 419827 5->12 6->5 8 4197af 6->8 10 4197b2-4197b4 8->10 13 4197b6-4197bd call 415425 10->13 14 4197be-4197c5 call 415775 10->14 17 4197e4-4197ed 11->17 18 4197fe-41980f 11->18 12->10 13->14 17->18 24 4197ef-4197f5 17->24 18->12 24->18 25 4197f7-4197fd call 4114be 24->25 25->18
    APIs
    • __getptd.LIBCMT ref: 00419798
      • Part of subcall function 0041507C: __getptd_noexit.LIBCMT ref: 0041507F
      • Part of subcall function 0041507C: __amsg_exit.LIBCMT ref: 0041508C
    • __amsg_exit.LIBCMT ref: 004197B8
    • __lock.LIBCMT ref: 004197C8
    • InterlockedDecrement.KERNEL32(?), ref: 004197E5
    • KiUserExceptionDispatcher.NTDLL(00C53EA0), ref: 00419810
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __amsg_exit$DecrementDispatcherExceptionInterlockedUser__getptd__getptd_noexit__lock
    • String ID: `LwLw$hYE
    • API String ID: 1607223099-1868819802
    • Opcode ID: 070528f0bb00ac138bdd5e0bf12ef970a7a33f49a1080944dea97c492fadb815
    • Instruction ID: 1fd2ef9fae20f7455bb009a0fd053acc4008355b4f0f2574046f944a93da9631
    • Opcode Fuzzy Hash: 070528f0bb00ac138bdd5e0bf12ef970a7a33f49a1080944dea97c492fadb815
    • Instruction Fuzzy Hash: 68013C32A11A11EBC611AF66A9957DA7760AF44B19F04401BE824A7291C73CACC1CADD

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 28 415791-4157b3 HeapCreate 29 4157b5-4157b6 28->29 30 4157b7-4157c0 28->30
    APIs
    • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 004157A6
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateHeap
    • String ID:
    • API String ID: 10892065-0
    • Opcode ID: 18ee4cbd4ec4915e17edf4517360bf1b6c3302f9700e1cd6665801720500a669
    • Instruction ID: 1ef63584ce5b18d6f33dc74bce39440e9b2c3b7ff28c8d1f1153e24744ebc019
    • Opcode Fuzzy Hash: 18ee4cbd4ec4915e17edf4517360bf1b6c3302f9700e1cd6665801720500a669
    • Instruction Fuzzy Hash: 28D05E365547849EDB105FB17C097633BDC93847A6F144436B91CC6290EA74C5908A08

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 31 419c2c-419c36 call 419a91 33 419c3b-419c48 31->33
    APIs
    • __setmbcp.LIBCMT ref: 00419C36
      • Part of subcall function 00419A91: __getptd.LIBCMT ref: 00419AA1
      • Part of subcall function 00419A91: getSystemCP.LIBCMT ref: 00419AB6
      • Part of subcall function 00419A91: __malloc_crt.LIBCMT ref: 00419ACC
      • Part of subcall function 00419A91: __setmbcp_nolock.LIBCMT ref: 00419AEF
      • Part of subcall function 00419A91: InterlockedDecrement.KERNEL32(?), ref: 00419B07
      • Part of subcall function 00419A91: InterlockedIncrement.KERNEL32(00000000), ref: 00419B2C
      • Part of subcall function 00419A91: __lock.LIBCMT ref: 00419B47
      • Part of subcall function 00419A91: InterlockedDecrement.KERNEL32 ref: 00419BBE
      • Part of subcall function 00419A91: InterlockedIncrement.KERNEL32(00000000), ref: 00419BE2
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Interlocked$DecrementIncrement$System__getptd__lock__malloc_crt__setmbcp__setmbcp_nolock
    • String ID:
    • API String ID: 3661747109-0
    • Opcode ID: a4aa430a0ea485177669a63add735206edd6a790e3d81403519a5e546d19d03f
    • Instruction ID: 521b89c1af4047e1179b04207361814fa638b9e91ec7f8fdec4065d112188c48
    • Opcode Fuzzy Hash: a4aa430a0ea485177669a63add735206edd6a790e3d81403519a5e546d19d03f
    • Instruction Fuzzy Hash: F4C09B711186414DC7049B666C5574B36505702325F20465EF490D04D7DE68998DD74D
    APIs
    • GetTickCount.KERNEL32 ref: 004325E0
    • SetErrorMode.KERNEL32(00008003), ref: 004325EF
    • SetUnhandledExceptionFilter.KERNEL32(0042AFAE), ref: 004325FA
      • Part of subcall function 0042560F: EnterCriticalSection.KERNEL32(00457AA4), ref: 0042561F
      • Part of subcall function 0042560F: LeaveCriticalSection.KERNEL32(00457AA4,?), ref: 00425689
      • Part of subcall function 0042560F: ReleaseSemaphore.KERNEL32(00000001,00000000), ref: 00425699
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    • InitializeCriticalSection.KERNEL32(00457A68,00000001,00000000), ref: 0043264A
    • InitializeCriticalSection.KERNEL32(00457A84), ref: 00432651
    • CoInitializeEx.OLE32(00000000,00000004), ref: 00432656
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00432666
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00432671
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 0043267C
      • Part of subcall function 00425CFC: SetProcessShutdownParameters.KERNEL32(?,00000001), ref: 00425D06
      • Part of subcall function 00425CFC: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00425D19
      • Part of subcall function 00425CFC: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000), ref: 00425D26
      • Part of subcall function 00425CFC: CreateThread.KERNEL32(00000000,00000000,004254D1,00000000,00000000,00000000), ref: 00425D47
      • Part of subcall function 00422595: GetStockObject.GDI32(00000011), ref: 004225A7
      • Part of subcall function 00422595: GetObjectW.GDI32(00000000), ref: 004225AE
      • Part of subcall function 00422595: CreateFontIndirectW.GDI32(00457AD8), ref: 004225BB
      • Part of subcall function 00422595: CreateFontIndirectW.GDI32(00000000), ref: 004225E3
      • Part of subcall function 00422595: GetDC.USER32(00000000), ref: 004225F3
      • Part of subcall function 00422595: GetDeviceCaps.GDI32(00000000,00000058), ref: 00422604
      • Part of subcall function 00422595: GetDeviceCaps.GDI32(00000000,0000005A), ref: 0042260C
      • Part of subcall function 00422595: ReleaseDC.USER32(00000000,00000000), ref: 00422630
    • GdiplusStartup.GDIPLUS(00457A80,?,00000000), ref: 004326C5
      • Part of subcall function 0043902A: __EH_prolog3_GS.LIBCMT ref: 00439034
      • Part of subcall function 0043902A: _memset.LIBCMT ref: 00439058
      • Part of subcall function 0043902A: GetVersionExW.KERNEL32(?,00457A80,?,00000000), ref: 0043906D
      • Part of subcall function 004256CE: __EH_prolog3_GS.LIBCMT ref: 004256D5
      • Part of subcall function 004256CE: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000003,00000007,00000000,00000000,00000000,00000000,00000030,0043661A,?,00000000,00000048,00436944,?,?), ref: 0042570A
      • Part of subcall function 0040450F: __EH_prolog3.LIBCMT ref: 00404516
      • Part of subcall function 0043CC15: __EH_prolog3.LIBCMT ref: 0043CC1C
      • Part of subcall function 004256CE: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000007,?,?,00000000,00000000), ref: 0042574A
      • Part of subcall function 0043CBD5: __EH_prolog3.LIBCMT ref: 0043CBDC
      • Part of subcall function 0043CB95: __EH_prolog3.LIBCMT ref: 0043CB9C
      • Part of subcall function 00438FD4: _memset.LIBCMT ref: 00438FE9
      • Part of subcall function 00438FD4: GlobalMemoryStatusEx.KERNEL32(?,?,?,?), ref: 00438FF8
      • Part of subcall function 00438D35: GetLogicalDriveStringsW.KERNEL32(00001000,?,39FCDDF2,00000001,?,00000000,?,?,0043DCFB,000000FF,?,00432B00,?,?,00000001,00000000), ref: 00438D94
      • Part of subcall function 00438B75: __EH_prolog3.LIBCMT ref: 00438B7C
      • Part of subcall function 00438B75: GetSystemMetrics.USER32(00000001), ref: 00438B8E
      • Part of subcall function 00438B75: GetSystemMetrics.USER32(00000000), ref: 00438B9F
      • Part of subcall function 00438AF3: __EH_prolog3.LIBCMT ref: 00438AFA
      • Part of subcall function 00438AF3: GetSystemMetrics.USER32(0000004F), ref: 00438B0C
      • Part of subcall function 00438AF3: GetSystemMetrics.USER32(0000004E), ref: 00438B1D
      • Part of subcall function 00422E9E: GetSystemDirectoryW.KERNEL32(00000000,00002002), ref: 00422ECC
      • Part of subcall function 00422E9E: GetVolumePathNameW.KERNEL32(00000000,00000000,00000100), ref: 00422EDD
      • Part of subcall function 00422E9E: GetVolumeInformationW.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00422EF2
      • Part of subcall function 00424C75: __EH_prolog3.LIBCMT ref: 00424C7C
    • IsUserAnAdmin.SHELL32 ref: 00433016
      • Part of subcall function 00439409: __EH_prolog3_GS.LIBCMT ref: 00439413
      • Part of subcall function 00439612: __EH_prolog3_catch_GS.LIBCMT ref: 0043961C
      • Part of subcall function 00428340: __EH_prolog3_GS.LIBCMT ref: 00428347
    • GetModuleHandleW.KERNEL32(00000000,0000000E,Function_00029A7D,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000), ref: 0043333B
    • EnumResourceNamesW.KERNEL32(00000000), ref: 00433342
      • Part of subcall function 00428340: IsBadWritePtr.KERNEL32(?,?,00000040,00433331,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000), ref: 00428393
      • Part of subcall function 004293A0: __EH_prolog3_catch.LIBCMT ref: 004293AA
      • Part of subcall function 00410FD3: _malloc.LIBCMT ref: 00410FED
      • Part of subcall function 00435F29: __EH_prolog3.LIBCMT ref: 00435F30
      • Part of subcall function 0042AEF9: __EH_prolog3.LIBCMT ref: 0042AF00
      • Part of subcall function 0042AEF9: MessageBoxW.USER32(00000000,00449E60,00449A58,00000010), ref: 0042AF17
      • Part of subcall function 0042AEF9: ExitProcess.KERNEL32 ref: 0042AF38
      • Part of subcall function 00436036: __EH_prolog3.LIBCMT ref: 0043603D
      • Part of subcall function 0043599A: __EH_prolog3.LIBCMT ref: 004359A1
      • Part of subcall function 0040455A: __EH_prolog3.LIBCMT ref: 00404561
      • Part of subcall function 00425B69: __EH_prolog3_GS.LIBCMT ref: 00425B70
      • Part of subcall function 00425B69: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000040,00426693,?,?,?,?,00000001,00000000,00000001,00000000,00000001), ref: 00425B91
      • Part of subcall function 00425B69: CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000008), ref: 00425BA1
      • Part of subcall function 004358F2: __EH_prolog3.LIBCMT ref: 004358F9
    • GetFileSizeEx.KERNEL32(00000000,?,?,?,?,00000001,00000000,?,004569E0,000000FF,?,?,?,?,004569C4,000000FF), ref: 00433E5C
    • CreateThread.KERNEL32(00000000,00000000,Function_0002A8B7,00000000,00000000,00000000), ref: 00433FEA
    • InitCommonControlsEx.COMCTL32(?), ref: 0043400C
    • GetTickCount.KERNEL32 ref: 00434012
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 00403C48: __EH_prolog3.LIBCMT ref: 00403C4F
      • Part of subcall function 00437503: __EH_prolog3_GS.LIBCMT ref: 0043750A
      • Part of subcall function 00437176: __EH_prolog3_GS.LIBCMT ref: 00437180
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$Create$H_prolog3_$EventSystem$CriticalMetricsSection$Initialize$AcquireByteCapsCharContextCountCryptDeviceFontIndirectMultiObjectProcessReleaseThreadTickVolumeWide_memset$AdminCommonControlsDirectoryDriveEnterEnumErrorExceptionExitFileFilterGdiplusGlobalH_prolog3_catchH_prolog3_catch_HandleInformationInitLeaveLogicalMemoryMessageModeModuleNameNamesParametersPathResourceSemaphoreShutdownSizeStartupStatusStockStringsUnhandledUserVersionWrite_mallocchar_traits
    • String ID: &delay=$&name=$&rnd=$.rar$.torrent$/close_install?$/unchecked_install?products2=$/unchecked_install?products=$067c98449203f5d6$0x004000e0$965e49065f683f77$<$<$ETag$HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion$PjE$S$S$admin=false$admin=true$antispyware=$antivirus=$baseBoard=$bigben$bios=$can't get form data: $can't get info: $can't parse get json$can't parse post json$checks$checks2$closed$d$disks=$display=$doM0b9lsEfwTznkEcOLYrFjZ5rhX2bhk$empty download url$fakefile$file.exe$file://$firewall=$get root is not object$guid=$harddisk=$hash=$hddId=$hzE$launch=$magnet$magnet:$magnet=$manufacturer=$memory=$name$net=$o$os=$post root is not object$products2=$products=$rar=$size$started$torrent=$unchecked2=$unchecked=$url$video=$virtDisplay=${$|$}
    • API String ID: 788250337-3935101873
    • Opcode ID: b527f6bf8120e83f0c9e35170ac207e4d7c65023489d219aab84df2421689fc9
    • Instruction ID: fd7b76a300167cbd82dc9d77ba2edb4830557efdf7ce028bbec8e0864ac944ce
    • Opcode Fuzzy Hash: b527f6bf8120e83f0c9e35170ac207e4d7c65023489d219aab84df2421689fc9
    • Instruction Fuzzy Hash: 6D33A3715083819ED320EB25DC46BDF77E8AF95358F00063EB599A32E2DA785904CB6B

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1271 42eadb-42ec8d call 412746 call 409a80 EnterCriticalSection call 422821 call 422811 call 4018b3 call 42c28f call 4018b3 call 42c28f call 4018b3 call 42c2d2 call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 40173a * 3 call 410fd3 1314 42eca0 1271->1314 1315 42ec8f-42ec9e call 422b99 1271->1315 1317 42eca2-42ecb9 call 428340 1314->1317 1315->1317 1321 42ecbb 1317->1321 1322 42ecbe-42ee69 call 4229be call 428340 call 422987 * 4 call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc * 2 call 42b2fb GetModuleHandleW LoadImageW 1317->1322 1321->1322 1353 42ee6b-42ee74 call 422987 1322->1353 1354 42ee79-42ef5b call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc * 2 call 42b2fb 1322->1354 1353->1354 1374 42ef6d-42f04b call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc * 2 call 42b2fb 1354->1374 1375 42ef5d-42ef67 SetFocus 1354->1375 1394 42f05d-42f13f call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc * 2 call 42b2fb 1374->1394 1395 42f04d-42f057 SetFocus 1374->1395 1375->1374 1414 42f141 1394->1414 1415 42f148-42f230 call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc * 2 call 42b2fb 1394->1415 1395->1394 1414->1415 1434 42f232 1415->1434 1435 42f239-42f320 call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc * 2 call 42b2fb 1415->1435 1434->1435 1454 42f322-42f325 call 42256d 1435->1454 1455 42f32a-42f3d2 call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc 1435->1455 1454->1455 1471 42f3d4 1455->1471 1472 42f3da-42f58c call 4020fc call 42b2fb call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a call 4020fc call 4010d2 call 42b2fb call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 403f05 1455->1472 1471->1472 1511 42f592-42f5a6 call 410fd3 1472->1511 1512 42f8d5-42f938 call 4018b3 call 409a80 call 42c258 call 409d90 call 409cc0 call 40173a 1472->1512 1517 42f5a8-42f5b7 call 422b99 1511->1517 1518 42f5b9 1511->1518 1542 42fd28-42fd9f call 4018b3 call 409a80 call 42c221 call 409d90 call 409cc0 call 40173a call 40ae20 call 40ade0 1512->1542 1543 42f93e-42fa8c call 409a80 * 2 call 4018b3 call 42c28f call 40173a call 4018b3 call 409a80 call 42c221 call 409d90 call 409cc0 call 40173a call 4018b3 call 409a80 call 42c221 call 409d90 call 409cc0 call 40173a call 40ae20 call 40ade0 call 406c71 1512->1543 1521 42f5bb-42f5fd call 422695 call 4229be call 42256d call 410fd3 1517->1521 1518->1521 1540 42f610 1521->1540 1541 42f5ff-42f60e call 422b99 1521->1541 1544 42f612-42f649 call 422695 call 4229be call 410fd3 1540->1544 1541->1544 1598 42fe51-42fe64 call 406c71 1542->1598 1691 42fba4-42fba6 1543->1691 1568 42f65a 1544->1568 1569 42f64b-42f658 call 422b99 1544->1569 1574 42f65c-42f677 call 422695 1568->1574 1569->1574 1582 42f680 1574->1582 1583 42f679-42f67e 1574->1583 1586 42f682-42f6b3 call 4229be call 410fd3 1582->1586 1583->1586 1603 42f6c6 1586->1603 1604 42f6b5-42f6c4 call 422b99 1586->1604 1610 42fda4-42fe4c call 40b550 call 409b40 call 4020fc * 2 call 42b2fb call 409cc0 call 406c93 1598->1610 1611 42fe6a-430030 call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 4018b3 call 42c28f call 40173a call 4018b3 call 409a80 call 42c221 call 409d90 call 409cc0 call 40173a call 40ae20 call 40ade0 call 406c71 1598->1611 1608 42f6c8-42f6ff call 422695 call 4229be call 410fd3 1603->1608 1604->1608 1634 42f712 1608->1634 1635 42f701-42f710 call 422b99 1608->1635 1610->1598 1810 430036 1611->1810 1811 430ddf-430e19 call 42a3b3 LeaveCriticalSection call 409cc0 call 40115a * 2 call 4127c9 1611->1811 1640 42f714-42f7c5 call 422695 call 4229be call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 403f05 1634->1640 1635->1640 1719 42f8d3 1640->1719 1720 42f7cb-42f7df call 410fd3 1640->1720 1695 42fa91-42fb32 call 40b550 call 409b40 call 4020fc * 2 call 42b2fb 1691->1695 1696 42fbac-42fbe6 call 40ae20 call 40ade0 call 406c71 1691->1696 1745 42fb46-42fb60 call 40539f 1695->1745 1746 42fb34-42fb40 1695->1746 1723 42fd02-42fd04 1696->1723 1719->1512 1734 42f7e1-42f7f6 call 422b99 1720->1734 1735 42f7f8-42f7fa 1720->1735 1728 42fd0a-42fd23 call 409cc0 * 2 1723->1728 1729 42fbeb-42fc90 call 40b550 call 409b40 call 4020fc * 2 call 42b2fb 1723->1729 1728->1542 1779 42fc92-42fc9e 1729->1779 1780 42fca4-42fcbe call 40539f 1729->1780 1739 42f800-42f892 call 422695 call 4229be call 4146f0 call 410cae GetSysColor 1734->1739 1735->1739 1781 42f899-42f8ba 1739->1781 1758 42fb62-42fb75 SendMessageW 1745->1758 1759 42fb7b-42fba2 call 409cc0 call 406c93 call 406c71 1745->1759 1746->1745 1758->1759 1759->1691 1779->1780 1792 42fcc0-42fcd3 SendMessageW 1780->1792 1793 42fcd9-42fd00 call 409cc0 call 406c93 call 406c71 1780->1793 1781->1781 1785 42f8bc-42f8ce call 422f5f call 422987 1781->1785 1785->1719 1792->1793 1793->1723 1813 43003d-430188 call 40b550 call 409b40 call 409a80 call 4018b3 call 409a80 call 42c221 call 409d90 call 409cc0 call 40173a call 4020fc * 2 call 42b2fb SendMessageW call 404c4d 1810->1813 1849 430192-430196 call 422703 1813->1849 1850 43018a-430190 1813->1850 1851 43019b-4301d0 call 40ae20 call 40ade0 call 406c71 1849->1851 1850->1849 1850->1851 1859 430d66-430dd9 EnterCriticalSection call 4052f5 LeaveCriticalSection call 405698 call 410f30 call 409cc0 * 2 call 406c93 call 406c71 1851->1859 1860 4301d6-430321 call 40b550 call 409b40 call 425784 call 423b15 call 40173a call 40455a call 425b69 call 4045a0 call 40173a * 2 call 404c83 call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a 1851->1860 1859->1811 1889 430038 1859->1889 1912 430d11-430d5e call 404d28 call 40173a * 2 call 409cc0 call 406c93 call 406c71 1860->1912 1913 430327-4305c1 call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a 1860->1913 1889->1813 1912->1860 1938 430d64 1912->1938 1997 4305c3-4305ec call 402124 1913->1997 1998 43063f-430645 1913->1998 1938->1859 2007 4305f2-43063a call 401ae8 call 4010d2 call 40115a call 401a23 1997->2007 2008 430719-430720 1997->2008 1999 4309a7-4309c6 call 4021d0 1998->1999 2000 43064b-430660 call 401a03 1998->2000 2012 4309ca-4309f2 call 402124 1999->2012 2013 4309c8 1999->2013 2014 430662-430695 call 401ae8 call 4010d2 call 40115a 2000->2014 2015 430697-4306a4 call 4010d2 2000->2015 2007->2008 2010 430722-430773 call 401ae8 call 423a5b call 403f05 2008->2010 2011 430775 2008->2011 2010->2011 2019 430777-43077e 2010->2019 2011->2019 2033 4309f4-4309fa 2012->2033 2034 4309fc-430a37 call 401ae8 call 4010d2 call 40115a 2012->2034 2013->2012 2024 4306a9-4306ce call 402124 2014->2024 2015->2024 2025 430780-430791 call 40115a 2019->2025 2026 430796-4307a4 2019->2026 2053 4306d0-43070f call 401ae8 call 4010d2 call 40115a call 401a23 2024->2053 2054 430714 2024->2054 2025->2026 2035 4307a6-4307b7 call 40115a 2026->2035 2036 4307bc-4307be 2026->2036 2044 430a3d-430a5c call 4021d0 2033->2044 2034->2044 2035->2036 2039 4307c0-4307cf call 401a23 2036->2039 2040 4307d4-43099c call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 401522 call 4358f2 call 4010d2 call 40115a call 4018b3 call 42c28f call 40173a CreateEventW call 409a80 call 4018b3 call 409a80 call 42c221 call 409d90 call 409cc0 call 40173a call 40ae20 call 40ade0 call 406c71 2036->2040 2039->2040 2128 4309a2 2040->2128 2129 430cf0-430d0c call 4051c7 call 409cc0 2040->2129 2066 430a60-430a67 2044->2066 2067 430a5e 2044->2067 2053->2054 2054->2008 2066->2008 2071 430a6d-430aa3 call 401ae8 call 4010d2 call 40115a 2066->2071 2067->2066 2071->2008 2131 430aad-430b86 call 40b550 call 409b40 call 401903 * 2 call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a 2128->2131 2129->1912 2156 430cb4-430cea call 404dbf call 409cc0 call 406c93 call 406c71 2131->2156 2157 430b8c-430c16 call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a 2131->2157 2156->2129 2174 430aa8 2156->2174 2157->2156 2181 430c1c-430caf call 401916 call 4018b3 call 42c35f call 4010d2 call 40115a call 40173a call 40115a call 405088 2157->2181 2174->2131 2181->2156
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042EAE5
    • EnterCriticalSection.KERNEL32(00457A68,000003BC,0043432B), ref: 0042EB2F
      • Part of subcall function 00422821: GetSystemMetrics.USER32(00000000), ref: 00422823
      • Part of subcall function 00422811: GetSystemMetrics.USER32(00000001), ref: 00422813
      • Part of subcall function 0042C35F: __EH_prolog3.LIBCMT ref: 0042C366
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
      • Part of subcall function 00410FD3: _malloc.LIBCMT ref: 00410FED
      • Part of subcall function 00422B99: __EH_prolog3.LIBCMT ref: 00422BA0
      • Part of subcall function 0042B2FB: __EH_prolog3.LIBCMT ref: 0042B302
    • GetModuleHandleW.KERNEL32(00000000,00000001,00000000,?,?,Icon,?,STATIC,00000001,00000000,00000000,?,000000FF), ref: 0042EE55
    • LoadImageW.USER32(00000000,?,?,Icon,?,STATIC), ref: 0042EE5C
    • SetFocus.USER32(?,?,?,00449F54,?,BUTTON,00000001,00000000,?,?,open,?,?,Icon,?,STATIC), ref: 0042EF67
    • SetFocus.USER32(?,?,?,00449F70,?,0044668C,00000001,00000000,?,?,download,?,?,00449F54,?,BUTTON), ref: 0042F057
      • Part of subcall function 0042B2FB: CreateThread.KERNEL32(00000000,00000000,0042A64E,00000000,00000000,00000000), ref: 0042B642
      • Part of subcall function 0042B2FB: CloseHandle.KERNEL32(00000000), ref: 0042B649
      • Part of subcall function 00410FD3: std::bad_alloc::bad_alloc.LIBCMT ref: 00411010
      • Part of subcall function 00410FD3: std::bad_exception::bad_exception.LIBCMT ref: 00411024
      • Part of subcall function 00410FD3: __CxxThrowException@8.LIBCMT ref: 00411032
    • _memset.LIBCMT ref: 0042F830
    • GetSysColor.USER32(0000000F), ref: 0042F877
    • SendMessageW.USER32(0000002F,000000F1,00000001,00000000), ref: 0042FB75
    • SendMessageW.USER32(00000030,000000F1,00000001,00000000), ref: 0042FCD3
    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0043014D
      • Part of subcall function 00404C4D: __EH_prolog3.LIBCMT ref: 00404C54
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000001,00000000,00000000,00000001,000000FF,00000001,00000000,00000001,000000FF,00000001,00000000,?), ref: 004308EC
    • EnterCriticalSection.KERNEL32(00457A84,?,?), ref: 00430D6C
    • LeaveCriticalSection.KERNEL32(00457A84,?,?), ref: 00430D84
    • LeaveCriticalSection.KERNEL32(00457A68,00000001,00000000,checks,00000001,00000000,00000000,00456970,000000FF,00000001,00000000,00456954,000000FF), ref: 00430DE9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalH_prolog3Section$MessageSend$CreateEnterFocusHandleLeaveMetricsSystem$CloseColorEventException@8H_prolog3_ImageLoadModuleThreadThrow_malloc_memsetchar_traitsstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID: $|E$.exe$/$9fe8oiOEygu$=$BUTTON$Icon$STATIC$Shield$V$^$banner_click$banner_height$banner_url$cancel$checks$clink$command$download$elements$expand$filehost$filename$filesize$icon$name$normal$noshield$nostd$open$save$type${
    • API String ID: 3243703554-213567703
    • Opcode ID: 2b6c6b837279c7987b4734d3e22cdc00cf3baadbf0bfeeb0ed2795609564aac8
    • Instruction ID: c3ed4073191fa4c7b7d5c4cef43e427c415c7e4c54833df8752c744cc65efb42
    • Opcode Fuzzy Hash: 2b6c6b837279c7987b4734d3e22cdc00cf3baadbf0bfeeb0ed2795609564aac8
    • Instruction Fuzzy Hash: 3E239671D00268AADB11EBA1DD85BCEB778AF14308F4041EAE509B31D2DB785F48CF69
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042CD66
      • Part of subcall function 00422821: GetSystemMetrics.USER32(00000000), ref: 00422823
      • Part of subcall function 00422811: GetSystemMetrics.USER32(00000001), ref: 00422813
      • Part of subcall function 00410FD3: _malloc.LIBCMT ref: 00410FED
      • Part of subcall function 00422B99: __EH_prolog3.LIBCMT ref: 00422BA0
      • Part of subcall function 00428340: __EH_prolog3_GS.LIBCMT ref: 00428347
      • Part of subcall function 00410FD3: std::bad_alloc::bad_alloc.LIBCMT ref: 00411010
      • Part of subcall function 00410FD3: std::bad_exception::bad_exception.LIBCMT ref: 00411024
      • Part of subcall function 00410FD3: __CxxThrowException@8.LIBCMT ref: 00411032
    • PostMessageW.USER32(00000000,00000401,00000000,10000000), ref: 0042D012
    • _malloc.LIBCMT ref: 0042D07B
    • _memset.LIBCMT ref: 0042D08C
    • GetSysColor.USER32(0000000F), ref: 0042D0C3
    • _memset.LIBCMT ref: 0042D103
    • SetTimer.USER32(00000001,0000008C,00429B44), ref: 0042D19F
    • EnableWindow.USER32(00000000), ref: 0042D65D
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0042DAAF
    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0042D950
      • Part of subcall function 0042B2FB: __EH_prolog3.LIBCMT ref: 0042B302
    • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0042DE13
      • Part of subcall function 00404C4D: __EH_prolog3.LIBCMT ref: 00404C54
      • Part of subcall function 0042C35F: __EH_prolog3.LIBCMT ref: 0042C366
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,00000001,00000000,00000000,?,000000FF,00000001,00000000,?,000000FF,00000001,00000000,?), ref: 0042E5B2
    • EnterCriticalSection.KERNEL32(00457A84), ref: 0042EA2F
    • LeaveCriticalSection.KERNEL32(00457A84), ref: 0042EA47
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3Message$Send$CriticalH_prolog3_MetricsSectionSystem_malloc_memset$ColorCreateEnableEnterEventException@8LeavePostThrowTimerWindowchar_traitsstd::bad_alloc::bad_allocstd::bad_exception::bad_exception
    • String ID: ($.exe$/$8jE$9fe8oiOEygu$<|E$BUTTON$RiE$STATIC$T|E$checks2$clink$command$elements2$expand$expand2$msctls_progress32$name$normal$rhE$type
    • API String ID: 1119828951-3016321018
    • Opcode ID: e4003c8650c3e4869035d6131b8139dc70eef8652eb74b7869ae5205343fbd30
    • Instruction ID: 15ab7fcb8a76c4cc8dfe6c7e44d1dd5f53b6a71a9f0d7bc010a207aaa12cd909
    • Opcode Fuzzy Hash: e4003c8650c3e4869035d6131b8139dc70eef8652eb74b7869ae5205343fbd30
    • Instruction Fuzzy Hash: BB03C771D01268AADB10EBA5DD45BDE77B8AF04308F5041EAF508B31D2DBB85F84CB69
    APIs
      • Part of subcall function 00424825: __EH_prolog3_GS.LIBCMT ref: 0042482C
      • Part of subcall function 00426718: __EH_prolog3.LIBCMT ref: 0042671F
      • Part of subcall function 00437A86: __EH_prolog3.LIBCMT ref: 00437A8D
      • Part of subcall function 00422C7E: WaitForSingleObject.KERNEL32(?), ref: 00422C8A
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
    • Sleep.KERNEL32(000493E0), ref: 00431862
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
      • Part of subcall function 0043599A: __EH_prolog3.LIBCMT ref: 004359A1
      • Part of subcall function 0040450F: __EH_prolog3.LIBCMT ref: 00404516
      • Part of subcall function 0042560F: EnterCriticalSection.KERNEL32(00457AA4), ref: 0042561F
      • Part of subcall function 0042560F: LeaveCriticalSection.KERNEL32(00457AA4,?), ref: 00425689
      • Part of subcall function 0042560F: ReleaseSemaphore.KERNEL32(00000001,00000000), ref: 00425699
    • SetEvent.KERNEL32(?), ref: 0043189A
    • SetEvent.KERNEL32(?), ref: 00432110
      • Part of subcall function 00435B8E: __EH_prolog3_catch_GS.LIBCMT ref: 00435B98
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$CriticalEventSection$EnterH_prolog3_H_prolog3_catch_LeaveObjectReleaseSemaphoreSingleSleepWaitchar_traits
    • String ID: $__HASH$$__MIX$&check=$&hash=$&launch=$&md5=$&name=$/launch_install?error=$/launch_install?name=$/touch_install?name=$3$=$>$@$H$HASH$O$P$PjE$Q$can't install $error=$hash=$install=$success=$|
    • API String ID: 2775165891-2421031922
    • Opcode ID: c16c660cb9a77eb71632fce79445cda187cdb4e3221daaab9be94b68e24045ce
    • Instruction ID: 316e6cf5cda1f7ca437387118d8e37e850847ae8e08c333ac08d3d370d8d0f94
    • Opcode Fuzzy Hash: c16c660cb9a77eb71632fce79445cda187cdb4e3221daaab9be94b68e24045ce
    • Instruction Fuzzy Hash: E9D2A2714083819FD735EB25C841BDFB7E8AF95308F00092EF599A7291DB786A09CB97

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3837 42b78d-42b7c8 3838 42c154-42c16b 3837->3838 3839 42b7ce-42b7dd call 422968 3837->3839 3839->3838 3842 42b7e3-42b7e9 3839->3842 3843 42bd8a-42bd8d 3842->3843 3844 42b7ef-42b7f2 3842->3844 3845 42bd93-42bd94 3843->3845 3846 42c06c-42c08d EnterCriticalSection 3843->3846 3847 42b7f8-42b7fb 3844->3847 3848 42bd6c-42bd85 call 429c4d SetEvent 3844->3848 3852 42bf80-42bfa5 call 422518 3845->3852 3853 42bd9a-42bd9b 3845->3853 3854 42c0c6-42c0df LeaveCriticalSection 3846->3854 3855 42c08f 3846->3855 3849 42b801-42b802 3847->3849 3850 42bd57-42bd67 PostMessageW 3847->3850 3848->3838 3856 42b808-42b809 3849->3856 3857 42b98e-42b996 3849->3857 3850->3838 3878 42bfa7 3852->3878 3879 42bfcd-42bfdf 3852->3879 3861 42be91-42beb0 EnterCriticalSection 3853->3861 3862 42bda1-42bda2 3853->3862 3858 42c0e1 3854->3858 3859 42c107-42c12c call 422518 3854->3859 3863 42c094-42c09e call 4052cf 3855->3863 3866 42b96e-42b973 call 429cc5 3856->3866 3867 42b80f-42b810 3856->3867 3874 42bafa-42bb37 call 4146f0 call 410cae * 2 3857->3874 3875 42b99c-42b99f 3857->3875 3868 42c0e6-42c105 call 40535b call 422703 3858->3868 3859->3838 3898 42c12e 3859->3898 3869 42beb2 3861->3869 3870 42bee9-42bf02 LeaveCriticalSection 3861->3870 3862->3838 3872 42bda8-42bdcd call 422518 3862->3872 3904 42c0b0-42c0c4 3863->3904 3905 42c0a0-42c0aa call 4052cf ShowWindow 3863->3905 3921 42b97d-42b989 DestroyWindow 3866->3921 3867->3838 3880 42b816-42b82c call 429cc5 3867->3880 3868->3859 3882 42beb7-42bec1 call 4052cf 3869->3882 3888 42bf04 3870->3888 3889 42bf2a-42bf4f call 422518 3870->3889 3914 42bdf5-42be07 3872->3914 3915 42bdcf 3872->3915 3973 42bb39 3874->3973 3974 42bb3e-42bb85 StrCpyW GetSaveFileNameW 3874->3974 3876 42b9a1-42b9b4 call 4010d2 3875->3876 3877 42b9b9-42b9fc call 425016 call 4010d2 call 40115a 3875->3877 3923 42bae6-42baeb call 429cc5 3876->3923 3983 42ba74-42bae1 call 426865 call 4010d2 call 40115a call 4244f8 call 4010d2 call 40115a 3877->3983 3984 42b9fe-42ba3a call 424016 call 4010d2 call 40115a 3877->3984 3891 42bfac-42bfcb call 40535b call 422703 3878->3891 3895 42bfe1 3879->3895 3896 42c006-42c027 EnterCriticalSection 3879->3896 3937 42b844-42b884 call 425016 call 4010d2 call 40115a 3880->3937 3938 42b82e-42b83f call 4010d2 3880->3938 3927 42bed3-42bee7 3882->3927 3928 42bec3-42becd call 4052cf ShowWindow 3882->3928 3900 42bf09-42bf28 call 40535b call 422703 3888->3900 3889->3838 3939 42bf55 3889->3939 3891->3879 3911 42bfe6-42c004 call 40535b call 422703 3895->3911 3916 42c060-42c067 LeaveCriticalSection 3896->3916 3917 42c029 3896->3917 3913 42c133-42c152 call 40535b call 422703 3898->3913 3900->3889 3904->3854 3904->3863 3905->3904 3911->3896 3913->3838 3935 42be09 3914->3935 3936 42be2e-42be4f EnterCriticalSection 3914->3936 3932 42bdd4-42bdf3 call 40535b call 422703 3915->3932 3916->3838 3933 42c02e-42c038 call 4052cf 3917->3933 3921->3838 3923->3874 3927->3870 3927->3882 3928->3927 3932->3914 3977 42c04a-42c05e 3933->3977 3978 42c03a-42c044 call 4052cf ShowWindow 3933->3978 3951 42be0e-42be2c call 40535b call 422703 3935->3951 3936->3916 3955 42be55 3936->3955 4012 42b886-42b8c0 call 424016 call 4010d2 call 40115a 3937->4012 4013 42b8fa-42b96c call 426865 call 4010d2 call 40115a call 4244f8 call 4010d2 call 40115a 3937->4013 3938->3921 3953 42bf5a-42bf79 call 40535b call 422703 3939->3953 3951->3936 4008 42bf7b 3953->4008 3970 42be5a-42be64 call 4052cf 3955->3970 4001 42be76-42be8a 3970->4001 4002 42be66-42be70 call 4052cf ShowWindow 3970->4002 3973->3974 3985 42bd41-42bd52 call 410f30 * 2 3974->3985 3986 42bb8b-42bbbc EnterCriticalSection call 4020fc call 401ac2 call 4020fc 3974->3986 3977->3916 3977->3933 3978->3977 3983->3923 3984->3983 4036 42ba3c-42ba6f call 426f06 call 4010d2 call 40115a 3984->4036 3985->3838 4037 42bd22-42bd3d call 429cc5 DestroyWindow 3986->4037 4038 42bbc2-42bc8a call 401ae8 * 2 call 426865 call 403c48 call 4010d2 call 40115a * 4 call 428420 3986->4038 4001->3970 4004 42be8c 4001->4004 4002->4001 4004->3916 4008->3838 4012->4013 4053 42b8c2-42b8f5 call 426f06 call 4010d2 call 40115a 4012->4053 4013->3921 4036->3983 4037->3985 4038->4037 4087 42bc90-42bd1d call 401ae8 * 2 call 4244f8 call 4010d2 call 40115a * 3 4038->4087 4053->4013 4087->4037
    APIs
    • _memset.LIBCMT ref: 0042BB04
    • StrCpyW.SHLWAPI(00000000,00000000), ref: 0042BB40
    • GetSaveFileNameW.COMDLG32 ref: 0042BB7D
    • EnterCriticalSection.KERNEL32(00457A68), ref: 0042BB90
      • Part of subcall function 00426F06: __EH_prolog3.LIBCMT ref: 00426F0D
      • Part of subcall function 00426F06: GetTempPathW.KERNEL32(00002000,00000000,0000003C,00427F7B,?,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001), ref: 00426F72
      • Part of subcall function 00403C48: __EH_prolog3.LIBCMT ref: 00403C4F
      • Part of subcall function 00428420: __EH_prolog3_GS.LIBCMT ref: 0042842A
    • DestroyWindow.USER32(39FCDDF2), ref: 0042B983
      • Part of subcall function 00429CC5: EnterCriticalSection.KERNEL32(00457A84,00456A34,0042BD27,004569E0,00000000,00456A34,00000000), ref: 00429CCB
      • Part of subcall function 00429CC5: SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00429D00
      • Part of subcall function 00429CC5: LeaveCriticalSection.KERNEL32(00457A84), ref: 00429D35
    • DestroyWindow.USER32(004569E0,00000000,00456A34,00000000), ref: 0042BD37
      • Part of subcall function 004244F8: __EH_prolog3_GS.LIBCMT ref: 00424502
    • PostMessageW.USER32(00000010,00000000,00000000,39FCDDF2), ref: 0042BD61
    • SetEvent.KERNEL32(39FCDDF2), ref: 0042BD7F
    • EnterCriticalSection.KERNEL32(00457A84,39FCDDF2), ref: 0042BE34
    • ShowWindow.USER32(00000000,00000000), ref: 0042BE70
    • EnterCriticalSection.KERNEL32(00457A84,39FCDDF2), ref: 0042BE97
    • ShowWindow.USER32(00000000,00000005), ref: 0042BECD
    • LeaveCriticalSection.KERNEL32(00457A84), ref: 0042BEEA
    • EnterCriticalSection.KERNEL32(00457A84,39FCDDF2), ref: 0042C00C
    • ShowWindow.USER32(00000000,00000000), ref: 0042C044
    • LeaveCriticalSection.KERNEL32(00457A84), ref: 0042C061
    • EnterCriticalSection.KERNEL32(00457A84,39FCDDF2), ref: 0042C072
    • ShowWindow.USER32(00000000,00000005), ref: 0042C0AA
    • LeaveCriticalSection.KERNEL32(00457A84), ref: 0042C0C7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalSection$EnterWindow$LeaveShow$DestroyH_prolog3H_prolog3_Message$EventFileNamePathPostSaveSendTemp_memset
    • String ID: $|E$$|E$4jE$4jE$4jE$<|E$<|E$T|E$T|E$iE
    • API String ID: 569381029-4121810622
    • Opcode ID: ccc9b8df258f366140dabf8a19aeb5912fd8c9c0a535e1b2d5fc2155e67d2dd4
    • Instruction ID: a9684f043562327aef19fedb1c825cbc8cc689bc0f016a8f665734b3c54653fc
    • Opcode Fuzzy Hash: ccc9b8df258f366140dabf8a19aeb5912fd8c9c0a535e1b2d5fc2155e67d2dd4
    • Instruction Fuzzy Hash: 8332DE316083109ED720EB69FD86B5F77A4EB81325F40063EF555A72E2CF78A8448B5E

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 4101 436131-43614e call 4126dd 4104 436150-436153 4101->4104 4105 436155 4101->4105 4106 436158-436178 HttpOpenRequestW 4104->4106 4105->4106 4107 43617a-4361be GetLastError call 423a1f call 403c93 call 401938 call 40115a * 2 4106->4107 4108 4361cf-4361d6 4106->4108 4138 4361c3-4361cc call 4127b5 4107->4138 4109 4361d8-4361db 4108->4109 4110 4361dd 4108->4110 4112 4361e0-4361ea 4109->4112 4110->4112 4115 4361f1 4112->4115 4116 4361ec-4361ef 4112->4116 4117 4361f4-436203 HttpSendRequestW 4115->4117 4116->4117 4119 436260-436288 call 410cae InternetQueryOptionW 4117->4119 4120 436205-43625b GetLastError call 423a1f call 403c93 call 401938 call 40115a * 2 InternetCloseHandle 4117->4120 4130 43628a-4362ba call 4043a0 call 401938 call 40115a 4119->4130 4131 4362bf-4362cb call 410f30 4119->4131 4120->4138 4130->4131 4143 4362d1-436336 call 410cae HttpQueryInfoA call 424901 call 401938 call 40115a call 410f30 4131->4143 4144 43637a-4363a3 HttpQueryInfoW 4131->4144 4200 436358-436360 4143->4200 4201 436338-436340 4143->4201 4145 4363d2-4363de 4144->4145 4146 4363a5-4363d0 GetLastError call 423a1f call 403c93 4144->4146 4153 436441-436446 4145->4153 4154 4363e0-4363ea 4145->4154 4172 436414-436431 call 401938 call 40115a * 2 4146->4172 4159 436448-436458 call 410cae 4153->4159 4160 4363ec-436410 call 423a1f call 403c93 4153->4160 4154->4159 4154->4160 4173 43645e-436464 4159->4173 4174 43659d-4365a6 call 410f30 4159->4174 4160->4172 4191 436436-43643c 4172->4191 4178 43653c-43654a InternetReadFile 4173->4178 4174->4191 4182 436550-436592 GetLastError call 423a1f call 403c93 call 401938 call 40115a 4178->4182 4183 436469-43646e 4178->4183 4234 436595-436598 call 40115a 4182->4234 4183->4174 4190 436474-43647e 4183->4190 4196 436480-436497 WriteFile 4190->4196 4197 4364f4-4364fb call 404305 4190->4197 4195 4365d1-4365dc InternetCloseHandle 4191->4195 4203 436499-43649c 4196->4203 4204 43649e-4364ef GetLastError call 423a1f call 403c93 call 401938 call 40115a 4196->4204 4206 436500-436508 4197->4206 4207 436362-43636c WaitForSingleObject 4200->4207 4208 436375 4200->4208 4201->4200 4218 436342 4201->4218 4203->4204 4203->4206 4204->4234 4212 43651a-436522 4206->4212 4213 43650a-436514 4206->4213 4207->4208 4214 43636e-436373 4207->4214 4208->4144 4219 436534-436539 4212->4219 4220 436524-43652e WaitForSingleObject 4212->4220 4213->4212 4231 4365ab-4365bc call 4020fc 4213->4231 4221 436347-436353 call 4020fc 4214->4221 4218->4221 4219->4178 4220->4219 4226 4365be-4365cf call 4020fc 4220->4226 4221->4200 4226->4195 4231->4174 4234->4174
    APIs
    • __EH_prolog3.LIBCMT ref: 0043613B
    • HttpOpenRequestW.WININET(?,?,?,00000000,00000000,00000000,8401F000,00000000), ref: 0043616D
    • GetLastError.KERNEL32 ref: 0043617A
    • HttpSendRequestW.WININET(?,?,?,?,?), ref: 004361FB
    • GetLastError.KERNEL32(?,?), ref: 00436205
    • InternetCloseHandle.WININET(?), ref: 00436255
    • InternetQueryOptionW.WININET(?,00000022,00000000,?), ref: 00436280
    • HttpQueryInfoA.WININET(?,00000016,?,?,?), ref: 004362F1
    • WaitForSingleObject.KERNEL32(?,00000000,00000001,00000000,39FCDDF2,?,00000000), ref: 00436364
    • HttpQueryInfoW.WININET(?,20000013,?,?,00000000), ref: 0043639B
    • GetLastError.KERNEL32(?,?), ref: 004363A5
    • WriteFile.KERNEL32(000000FF,?,00000000,?,00000000,?,?), ref: 0043648C
    • GetLastError.KERNEL32(?,?), ref: 004364A4
    • WaitForSingleObject.KERNEL32(?,00000000,?,?), ref: 00436526
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
    • InternetReadFile.WININET(?,00000000,00002000,00000000), ref: 00436542
    • GetLastError.KERNEL32(?,?), ref: 00436550
    • InternetCloseHandle.WININET(?), ref: 004365D4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ErrorLast$HttpInternet$Query$CloseFileH_prolog3HandleInfoObjectRequestSingleWait$OpenOptionReadSendWrite
    • String ID: Error HTTP status $Error creating request #$Error getting HTTP status #$Error receiving data #$Error sending request #$Error writing file #$User abort (cancel event)$User abort (info event)$User abort (processing event)
    • API String ID: 1727858857-1016459219
    • Opcode ID: 1cd957d919c8612a13d9f18ba21566041b531b443fea5b2d9e353df978129ca9
    • Instruction ID: 4b7b48a5cc91dc7a0910eca757b372327e20cd8b9b5fdbd3b71de3d1043d8e5a
    • Opcode Fuzzy Hash: 1cd957d919c8612a13d9f18ba21566041b531b443fea5b2d9e353df978129ca9
    • Instruction Fuzzy Hash: 6ED17071900209BFEB00EFA0DC46BDE7B78AF18304F21812AF505B7191DB789E45DBA9

    Control-flow Graph

    APIs
    • GetCommandLineW.KERNEL32(00000001,00000000,00000001,00000000), ref: 004354CE
    • ExitProcess.KERNEL32 ref: 00435532
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CommandExitLineProcess
    • String ID: :Zone.Identifier$parent=$start$watch
    • API String ID: 3244267597-1100331691
    • Opcode ID: aec89578431a926b7a699dc7122402a80266f76b5bbce733d935af878e54135c
    • Instruction ID: 0d7122c6c2eb8cfa12636c180545561c5d9ffa87441a7c3eb0c9f26322d81ae7
    • Opcode Fuzzy Hash: aec89578431a926b7a699dc7122402a80266f76b5bbce733d935af878e54135c
    • Instruction Fuzzy Hash: 99913071900228EEEB20EBA5DC45FDEBBB8EF49304F1141AAF509B3191DA745E84CF65

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 4667 429751-429770 SetErrorMode 4668 429772-42977e 4667->4668 4669 429787-429793 4667->4669 4672 429781-429782 call 4122ab 4668->4672 4670 4297a6-4297af 4669->4670 4671 429795-4297a4 4669->4671 4674 4297c2-4297d2 4670->4674 4675 4297b1-4297c0 4670->4675 4671->4672 4672->4669 4676 4297d4-4297da 4674->4676 4677 4297ef-429800 4674->4677 4675->4672 4678 4297dc-4297e4 4676->4678 4679 429802-429811 VirtualAlloc 4677->4679 4680 429827-429830 VirtualAlloc 4677->4680 4681 4297e6 4678->4681 4682 4297e9-4297ed 4678->4682 4683 429813-429822 4679->4683 4684 429849-429870 call 413300 4679->4684 4685 429832-429841 4680->4685 4686 429846 4680->4686 4681->4682 4682->4677 4682->4678 4683->4672 4689 429872 4684->4689 4690 4298a0-4298a6 4684->4690 4685->4672 4686->4684 4691 429878-42989c call 413300 4689->4691 4692 429974-429984 4690->4692 4693 4298ac-4298be HeapCreate 4690->4693 4705 42989e 4691->4705 4695 429986-429988 4692->4695 4696 4299e8-429a06 GetPEB * 3 4692->4696 4697 4298c0-4298cc 4693->4697 4698 4298d4-4298dc 4693->4698 4695->4696 4701 42998a-429999 4695->4701 4699 429a40-429a43 4696->4699 4697->4698 4702 429969-42996c 4698->4702 4706 429a30-429a33 4699->4706 4707 429a45-429a5c CreateThread 4699->4707 4701->4696 4708 42999b-4299b0 4701->4708 4703 429972 4702->4703 4704 4298e1-4298fd LoadLibraryA 4702->4704 4703->4692 4715 42995d-429961 4704->4715 4705->4690 4709 429a35-429a3b 4706->4709 4710 429a3e 4706->4710 4711 429a72-429a73 ExitThread 4707->4711 4712 429a5e-429a6a 4707->4712 4713 4299b2-4299c4 4708->4713 4714 4299e3-4299e6 4708->4714 4709->4710 4710->4699 4712->4711 4718 4299c6-4299c9 4713->4718 4719 4299d7-4299df 4713->4719 4714->4696 4714->4708 4716 429963-429966 4715->4716 4717 4298ff 4715->4717 4716->4702 4722 429901-429906 4717->4722 4723 429908-42990d 4717->4723 4720 4299cb-4299d5 4718->4720 4721 429a1c-429a28 4718->4721 4719->4713 4724 4299e1 4719->4724 4720->4719 4721->4706 4725 429910-42992c GetProcAddress HeapAlloc 4722->4725 4723->4725 4724->4714 4726 429932-42995b 4725->4726 4727 429a08-429a14 4725->4727 4726->4715 4727->4721
    APIs
    • SetErrorMode.KERNEL32(00008003), ref: 0042975F
    • __CxxThrowException@8.LIBCMT ref: 00429782
    • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000040), ref: 00429804
    • VirtualAlloc.KERNEL32(?,00000000,00003000,00000040), ref: 00429828
    • HeapCreate.KERNEL32(00040000,00000000,00000000), ref: 004298B3
    • LoadLibraryA.KERNEL32(?), ref: 004298E7
    • CreateThread.KERNEL32(00000000,00000000,Function_00029737,?,00000000,00000000), ref: 00429A54
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AllocCreateVirtual$ErrorException@8HeapLibraryLoadModeThreadThrow
    • String ID: Not normal PE format$PE$Wrong PE file$Wrong PE signature$can't create thread$error allocating executable memory$error allocating virtual memory$error creating executable heap$unknown relocation
    • API String ID: 2240408483-2104063785
    • Opcode ID: 97398cd2d12feaf67868aa5b4a4faeb871609d64f1c99db199b726c0798894ee
    • Instruction ID: b54677a59409a7631a4890d18f7b32f9ae8a4c8d5d3c7ef93aba61066c9dd9dd
    • Opcode Fuzzy Hash: 97398cd2d12feaf67868aa5b4a4faeb871609d64f1c99db199b726c0798894ee
    • Instruction Fuzzy Hash: 39A1BFB0E00225DFDB10CF54D885BAEBBB4FF85714F69806AE805AB341D3789E41CB99
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00435203
      • Part of subcall function 004280BA: GetModuleFileNameW.KERNEL32(00000000,?,00002000,39FCDDF2,?,?,?,?,0043FA29,000000FF), ref: 0042814A
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 004235EB: GetFileAttributesW.KERNEL32(?,00428438,0000010C,00428781), ref: 004235FA
    • GetLastError.KERNEL32 ref: 004352E3
    • __CxxThrowException@8.LIBCMT ref: 00435341
    • GetFileSize.KERNEL32(00000000,00000000), ref: 0043534A
    • CloseHandle.KERNEL32(00000000), ref: 00435359
    • ReadFile.KERNEL32(00000000,?,?,?,00000000), ref: 0043539A
    • GetLastError.KERNEL32 ref: 004353A4
    • CloseHandle.KERNEL32(00000000), ref: 004353AB
    • CloseHandle.KERNEL32(00000000), ref: 004353D2
    • CloseHandle.KERNEL32(00000000), ref: 004353F8
    Strings
    • error getting length of installer binary file, xrefs: 0043535F
    • error reading installer binary file, xrefs: 004353B1
    • readed 0 bytes from installer binary file, xrefs: 004353D8
    • .tmp, xrefs: 0043525F
    • installer not found, xrefs: 0043532B
    • :tmp, xrefs: 0043521D
    • error opening file installer file #, xrefs: 0043530C
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseFileHandle$ErrorLast$AttributesException@8H_prolog3H_prolog3_catch_ModuleNameReadSizeThrow
    • String ID: .tmp$:tmp$error getting length of installer binary file$error opening file installer file #$error reading installer binary file$installer not found$readed 0 bytes from installer binary file
    • API String ID: 615348424-1581479894
    • Opcode ID: 904b703371ca32a860d5893ecc0a00f43d66c24fd0814ab5fc0b99c3a076131c
    • Instruction ID: 3b3e26dca64477f62a9120ed8b4100f58ff862ed03814ac2963a769bc36513cc
    • Opcode Fuzzy Hash: 904b703371ca32a860d5893ecc0a00f43d66c24fd0814ab5fc0b99c3a076131c
    • Instruction Fuzzy Hash: 22614B70D04658EEEB20EBB0DC45BDE7B78AF19304F60419BF509B7182D7BC5A848B69
    APIs
    • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000000), ref: 004258D1
    • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000008), ref: 004258E4
    • CloseHandle.KERNEL32(?), ref: 004258F0
    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 0042590F
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00425920
    • CryptHashData.ADVAPI32(?,?,?,00000000,?,?,?,?,0043E52C,000000FF), ref: 00425946
    • CryptDestroyHash.ADVAPI32(?), ref: 00425956
    • ReadFile.KERNEL32(?,?,00000001,?,00000000), ref: 0042598E
    • ReadFile.KERNEL32(?,?,00002000,?,00000000), ref: 00425A4D
    • CryptDestroyHash.ADVAPI32(?), ref: 00425A5D
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00425A6A
    • CloseHandle.KERNEL32(?), ref: 00425A76
    • CloseHandle.KERNEL32(?), ref: 00425ABE
    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000), ref: 00425AF0
    • CryptDestroyHash.ADVAPI32(?), ref: 00425B00
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00425B0D
    • CryptDestroyHash.ADVAPI32(?), ref: 00425B18
    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00425B25
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Crypt$Hash$Context$DestroyRelease$CloseHandle$AcquireFileRead$CreateDataParam
    • String ID:
    • API String ID: 2833777535-0
    • Opcode ID: 749c067f7258aa6881c8257514f2968c2d099e5792a6e7dc08564e45d43b78d5
    • Instruction ID: 62a9c53d7b416ea82e01d91120d7e20a5a7d311e0fb15a58ac96514ce989fe3a
    • Opcode Fuzzy Hash: 749c067f7258aa6881c8257514f2968c2d099e5792a6e7dc08564e45d43b78d5
    • Instruction Fuzzy Hash: B691A4B1A00228EFDB25AB50DC89BAE777DEB04354F5080EBF605A7162D6785E84CF58
    APIs
      • Part of subcall function 00435F29: __EH_prolog3.LIBCMT ref: 00435F30
    • PathCreateFromUrlW.SHLWAPI(-00000004,?,00002000,00000000,00000001,00000000,?,00000001,00000001,00000000,?,000000FF,?,00000001), ref: 004381EB
      • Part of subcall function 00423A5B: CharLowerW.USER32(00000000), ref: 00423AB0
      • Part of subcall function 00426F06: __EH_prolog3.LIBCMT ref: 00426F0D
      • Part of subcall function 00426F06: GetTempPathW.KERNEL32(00002000,00000000,0000003C,00427F7B,?,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001), ref: 00426F72
      • Part of subcall function 004278AA: __EH_prolog3_GS.LIBCMT ref: 004278B4
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 00403C48: __EH_prolog3.LIBCMT ref: 00403C4F
      • Part of subcall function 00437385: __EH_prolog3.LIBCMT ref: 0043738C
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
      • Part of subcall function 00428420: __EH_prolog3_GS.LIBCMT ref: 0042842A
      • Part of subcall function 00428420: SetFileAttributesW.KERNEL32(?,00000080,0000010C,00428781), ref: 00428462
      • Part of subcall function 00428420: DeleteFileW.KERNEL32(?), ref: 00428475
      • Part of subcall function 00428420: EqualSid.ADVAPI32(?,00000000), ref: 00428498
      • Part of subcall function 00428420: SetFileAttributesW.KERNEL32(?,00000080), ref: 004284E6
      • Part of subcall function 00428420: DeleteFileW.KERNEL32(?), ref: 004284F5
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$File$AttributesDeleteH_prolog3_Path$CharCreateEqualFromLowerTempchar_traits
    • String ID: .exe$.tmp$.wsf$0$:tmp$?$WSF$download error: $file$file not exists$wrong file path$wrong file url$wsf$|
    • API String ID: 523631333-489822373
    • Opcode ID: 918a9405122f7012968844ff79ad95de6e1eeb6c0c846190ffa797bb09cf43b1
    • Instruction ID: 6adf644fb4b5ea92389c51101888bdbaca163d7e081d06447c3e5e940b648ded
    • Opcode Fuzzy Hash: 918a9405122f7012968844ff79ad95de6e1eeb6c0c846190ffa797bb09cf43b1
    • Instruction Fuzzy Hash: EA7280B1904268A9EB24EB61DD45BDDB7B8AF14304F5001EAF709731D2CB781F89CB69
    APIs
    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00427036
    • _memset.LIBCMT ref: 0042705F
    • Process32FirstW.KERNEL32(?,?), ref: 0042707A
    • GetLastError.KERNEL32 ref: 00427083
    • CloseHandle.KERNEL32(?), ref: 00427091
      • Part of subcall function 00405232: __EH_prolog3.LIBCMT ref: 00405239
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseCreateErrorFirstH_prolog3HandleLastProcess32SnapshotToolhelp32_memset
    • String ID:
    • API String ID: 2707144682-0
    • Opcode ID: 443611af71cdd47840dc23048ff41d7b0528b27a6badbb309de9d3261b12f720
    • Instruction ID: 9ac7801abe6b743a160ea4084e2c28b271d4e567d7e2c0d7215ed04be1841866
    • Opcode Fuzzy Hash: 443611af71cdd47840dc23048ff41d7b0528b27a6badbb309de9d3261b12f720
    • Instruction Fuzzy Hash: 2F815FF2A051289BDB20EBA1DC459DEB7BCAB44304F8101EAF709B3151DB385F858F69
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00425B70
    • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000000,00000040,00426693,?,?,?,?,00000001,00000000,00000001,00000000,00000001), ref: 00425B91
    • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000001,00000008), ref: 00425BA1
    • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00425BC7
    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,00000000), ref: 00425BD5
    • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 00425BF6
    • CryptDestroyHash.ADVAPI32(?,?,?,00000000), ref: 00425C03
    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,?,00000000), ref: 00425C1C
    • CryptDestroyHash.ADVAPI32(?,?,?,00000000), ref: 00425C29
    • CryptReleaseContext.ADVAPI32(?,00000000,?,?,00000000), ref: 00425C33
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Crypt$Hash$Context$AcquireDestroyRelease$CreateDataH_prolog3_Param
    • String ID:
    • API String ID: 277041088-0
    • Opcode ID: bf82822744feac790fa503f2b5207d65905533f3422dc639ffaf1cc3a11768cb
    • Instruction ID: 722c7356b26187e6e223083f3a9ca124ef0bb319af85fffe88d3548124a3fced
    • Opcode Fuzzy Hash: bf82822744feac790fa503f2b5207d65905533f3422dc639ffaf1cc3a11768cb
    • Instruction Fuzzy Hash: F1317075A00118EBDF219F91ED45EAF7F78EF85B04F40002AF601E6151D778AD12CB68
    APIs
    • GetLogicalDriveStringsW.KERNEL32(00001000,00000000), ref: 00426A30
    • lstrlenW.KERNEL32(?), ref: 00426A5B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: DriveLogicalStringslstrlen
    • String ID: \device\mup
    • API String ID: 488508356-3219234528
    • Opcode ID: 0db4c7fddc13477787548f23fda2e2f340d30e7058ea03a77fc1ef452a3ba0a4
    • Instruction ID: 136772589e172c8eecef4edaab94573e2ba3b1040a3709d37e2d367ea7e22c2f
    • Opcode Fuzzy Hash: 0db4c7fddc13477787548f23fda2e2f340d30e7058ea03a77fc1ef452a3ba0a4
    • Instruction Fuzzy Hash: 1502A031608390DED730EB25DC45B9BB7E4AF84304F41092EF689A72A1D7789985CB5B
    APIs
    • CoInitializeEx.OLE32(00000000,00000004,39FCDDF2), ref: 004261E0
    • CoCreateInstance.OLE32(00444620,00000000,00000001,00444550,?), ref: 004261FC
      • Part of subcall function 00405232: __EH_prolog3.LIBCMT ref: 00405239
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateH_prolog3InitializeInstance
    • String ID: SELECT * FROM $WQL$false$true
    • API String ID: 2253557830-1835089314
    • Opcode ID: d068d01394db77217c394c4173f88ccc758118cc47a9cc3958f652b16a4f0aa3
    • Instruction ID: b0341a41e5de7f498bcc83a3879e37a18f74dd50389aa0e2ce0f2aa8708185c0
    • Opcode Fuzzy Hash: d068d01394db77217c394c4173f88ccc758118cc47a9cc3958f652b16a4f0aa3
    • Instruction Fuzzy Hash: A4C1BE71208350EFD720DF64D884B5BB7E9FF85318F404A2EF589A7290C778A845CB9A
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 0043C242
      • Part of subcall function 0042425D: __EH_prolog3_GS.LIBCMT ref: 00424264
      • Part of subcall function 0042425D: AssocQueryStringW.SHLWAPI(00000000,00000002,?,open,00000000,?), ref: 004242AF
      • Part of subcall function 00423A5B: CharLowerW.USER32(00000000), ref: 00423AB0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AssocCharH_prolog3_H_prolog3_catch_LowerQueryString
    • String ID: .$/$Software\Clients\StartMenuInternet$Software\Clients\StartMenuInternet\$\shell\open\command$http
    • API String ID: 1119234328-1412654641
    • Opcode ID: fd8297a871e217796c860c463b844c334d5ef12a58c28177baf2fe964d1fc8aa
    • Instruction ID: 1eb86aa033c9b12e98e92e54c4575993b1ed7fa9952751f478fe4d00b7e0e9cd
    • Opcode Fuzzy Hash: fd8297a871e217796c860c463b844c334d5ef12a58c28177baf2fe964d1fc8aa
    • Instruction Fuzzy Hash: 00325F71C00268EADF10EBA5DC45BDDB7B8AF05318F1041AAE509B7191DB782F89CB65
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateH_prolog3InitializeInstance
    • String ID: ROOT\CIMv2$Win32_ComputerSystem$manufacturer$model$parallels$qemu$virtual$virtualbox$vmware$wine
    • API String ID: 2253557830-1039051433
    • Opcode ID: 8d67a11d0596b2c4d3af04924b06e87482c069017be62ddfce72ec3782c19ca6
    • Instruction ID: a4b91d119231cb88bf96448be7fc215d2d24d9dde2bde17f60e2b97eea420c52
    • Opcode Fuzzy Hash: 8d67a11d0596b2c4d3af04924b06e87482c069017be62ddfce72ec3782c19ca6
    • Instruction Fuzzy Hash: F46181715083819ED320EF25C801B9FBBE4AFD5714F01492EF599632A1CBB8A949CB97
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00439034
    • _memset.LIBCMT ref: 00439058
    • GetVersionExW.KERNEL32(?,00457A80,?,00000000), ref: 0043906D
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 00403C48: __EH_prolog3.LIBCMT ref: 00403C4F
      • Part of subcall function 004028E7: std::_String_base::_Xlen.LIBCPMT ref: 00402920
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$H_prolog3_String_base::_VersionXlen_memsetstd::_
    • String ID: ;product:$;sp$;suite:$win
    • API String ID: 4250304953-281868712
    • Opcode ID: 01c14edb89127d304fb1365c45faa37f4d60ac96574300bb39d2b5740cb77128
    • Instruction ID: ab2b0322a524e2439dea9c6ab9990f47c670feaf4b2a85c31e4b37f9be0f07c2
    • Opcode Fuzzy Hash: 01c14edb89127d304fb1365c45faa37f4d60ac96574300bb39d2b5740cb77128
    • Instruction Fuzzy Hash: C56180B2800168EADF11FB55DD45BDEB7BCAF0A309F0042EAB64AB7191C6381F44CB64
    APIs
    • IsDebuggerPresent.KERNEL32 ref: 00414857
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0041486C
    • UnhandledExceptionFilter.KERNEL32(8mE), ref: 00414877
    • GetCurrentProcess.KERNEL32(C0000409), ref: 00414893
    • TerminateProcess.KERNEL32(00000000), ref: 0041489A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
    • String ID: 8mE
    • API String ID: 2579439406-64802255
    • Opcode ID: 0acd18575805a41008e4ec1ddd4a0e9de60e734d6635b25e07917fd3c968d44b
    • Instruction ID: 3e0c7eb9b6911ec400a73a65f5c5a9442d8ccca820bd004e77448947532fdf7f
    • Opcode Fuzzy Hash: 0acd18575805a41008e4ec1ddd4a0e9de60e734d6635b25e07917fd3c968d44b
    • Instruction Fuzzy Hash: AC21C379602304DFC751DF69F8866583BB1FB49717F92053AE80887262E7B5D9848F0D
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042578B
    • CryptAcquireContextW.ADVAPI32(00000001,00000000,00000000,00000001,00000000,00000028,004301FF,?,?,0044668C,?,BUTTON,00000001,00000000), ref: 004257A4
    • CryptAcquireContextW.ADVAPI32(00000001,00000000,00000000,00000001,00000008,?,?,0044668C,?,BUTTON,00000001,00000000,?,?,0044A128), ref: 004257B4
    • CryptGenRandom.ADVAPI32(00000001,00000010,00000000,?,?,0044668C,?,BUTTON,00000001,00000000,?,?,0044A128,?,?), ref: 004257DB
    • CryptReleaseContext.ADVAPI32(00000001,00000000,?,?,0044668C,?,BUTTON,00000001,00000000,?,?,0044A128,?,?), ref: 004257F0
    • CryptReleaseContext.ADVAPI32(00000001,00000000,?,?,0044668C,?,BUTTON,00000001,00000000,?,?,0044A128,?,?), ref: 00425813
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Crypt$Context$AcquireRelease$H_prolog3_Random
    • String ID:
    • API String ID: 4230544423-0
    • Opcode ID: 90e3a332d0f44ea3a7c411b15e082429262e7e69f687be34c474dedb78dd9f2e
    • Instruction ID: 5308e311dfbab4923009fcb6e8bf334439d8e9638a49863c82996ffb7b6a7c69
    • Opcode Fuzzy Hash: 90e3a332d0f44ea3a7c411b15e082429262e7e69f687be34c474dedb78dd9f2e
    • Instruction Fuzzy Hash: 7311C435641224B6DB206B62ED46FDF2EB9EFC5B04F00402FF501F61D1DAB85851C66C
    APIs
    • __EH_prolog3.LIBCMT ref: 00438C00
    • GetSystemInfo.KERNEL32(?,00000064), ref: 00438C4D
    • CallNtPowerInformation.POWRPROF(0000000B,00000000,00000000,00000000,?), ref: 00438C7C
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 004028E7: std::_String_base::_Xlen.LIBCPMT ref: 00402920
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$CallInfoInformationPowerString_base::_SystemXlenstd::_
    • String ID: x~E$x~E
    • API String ID: 2350546440-560470620
    • Opcode ID: cf831d3ee502281583cc4df36d9f901577fa101954926870b1123bf9dbf4c2b8
    • Instruction ID: 574bf5f43bd349b58a52322ccff70d10b874ab0161a598cf5352ef13c78e8c8f
    • Opcode Fuzzy Hash: cf831d3ee502281583cc4df36d9f901577fa101954926870b1123bf9dbf4c2b8
    • Instruction Fuzzy Hash: BE31D2719003489ADB00EBA5EC42A9EB7B8EF54704F10416FF510BB2E6DBBC9D41CB69
    APIs
    • __EH_prolog3.LIBCMT ref: 0042C175
    • SetErrorMode.KERNEL32(00000003,00000028), ref: 0042C17C
    • SetUnhandledExceptionFilter.KERNEL32(0042AFAE), ref: 0042C187
      • Part of subcall function 00425CFC: SetProcessShutdownParameters.KERNEL32(?,00000001), ref: 00425D06
      • Part of subcall function 00425CFC: CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00425D19
      • Part of subcall function 00425CFC: CreateEventW.KERNEL32(00000000,00000001,00000001,00000000), ref: 00425D26
      • Part of subcall function 00425CFC: CreateThread.KERNEL32(00000000,00000000,004254D1,00000000,00000000,00000000), ref: 00425D47
    • GetStdHandle.KERNEL32(000000F6), ref: 0042C1A4
    • ReadFile.KERNEL32(00002800,00000000,00002800,00000000,00000000), ref: 0042C20B
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Create$Event$ErrorExceptionFileFilterH_prolog3HandleModeParametersProcessReadShutdownThreadUnhandled
    • String ID:
    • API String ID: 3891794355-0
    • Opcode ID: bd86557a0ed74266805c3657539739b991f94d7dd37d26b857bf3afa3ad5bbaa
    • Instruction ID: 8846ae277785d46b3337cffbe9707705f0a8aa01be9701fbae8a3b8e2bc95318
    • Opcode Fuzzy Hash: bd86557a0ed74266805c3657539739b991f94d7dd37d26b857bf3afa3ad5bbaa
    • Instruction Fuzzy Hash: B321A331900129ABCB10EBA1EC46EAF7B79EF45364F20412AB915771D1DB745A40CBA9
    APIs
    • LoadLibraryW.KERNEL32(Shell32.dll), ref: 0042310B
    • GetProcAddress.KERNEL32(00000000,SHGetKnownFolderPath), ref: 0042311B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AddressLibraryLoadProc
    • String ID: SHGetKnownFolderPath$Shell32.dll
    • API String ID: 2574300362-677601484
    • Opcode ID: 8034a7f4e655071b12dc6d1c6146d7e877848fd331e7bd672af571b6cdb002b2
    • Instruction ID: 9c59a11bb608c45f5c912b4f09642cae9e6170e9d4d7c7e6b9a44a472645e801
    • Opcode Fuzzy Hash: 8034a7f4e655071b12dc6d1c6146d7e877848fd331e7bd672af571b6cdb002b2
    • Instruction Fuzzy Hash: 6EE012717483656BEB228FA4FC05B253BB8A744B46F404035FA0CD62E1DBBDD960879C
    APIs
    • GetCurrentProcess.KERNEL32(00000020,?), ref: 00423328
    • OpenProcessToken.ADVAPI32(00000000), ref: 0042332F
    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00423353
    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?), ref: 00423382
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
    • String ID:
    • API String ID: 2349140579-0
    • Opcode ID: 3a78965e001d3ee2950770e204fa09ccffc060e03e66ddb62bc50cb2723a8532
    • Instruction ID: 6d1cde34815f058760b6867a97504a6169b9edd93a7948029eafd4167bf6bdbb
    • Opcode Fuzzy Hash: 3a78965e001d3ee2950770e204fa09ccffc060e03e66ddb62bc50cb2723a8532
    • Instruction Fuzzy Hash: 68014C76900229EBDB10DFE5D808AEFBBBCAF06701F404166E901E2140D7789B048BE4
    APIs
    • GetLogicalDriveStringsW.KERNEL32(00001000,?,39FCDDF2,00000001,?,00000000,?,?,0043DCFB,000000FF,?,00432B00,?,?,00000001,00000000), ref: 00438D94
    • GetDriveTypeW.KERNEL32(?), ref: 00438E48
    • GetDiskFreeSpaceExW.KERNEL32(?,00000000,00000000,?), ref: 00438E7F
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Drive$DiskFreeLogicalSpaceStringsType
    • String ID:
    • API String ID: 400115644-0
    • Opcode ID: eb6cfdd5d258c35b1cbc920093279356d5a7ea57bf3c6a6b2b3f77445b177c36
    • Instruction ID: 3cf13efdad4f1d2b442809ccf1cb84a8caa194b19d480cb0d2bc4547a643e96a
    • Opcode Fuzzy Hash: eb6cfdd5d258c35b1cbc920093279356d5a7ea57bf3c6a6b2b3f77445b177c36
    • Instruction Fuzzy Hash: E6616E715083849ED720DF64CC45B9BB7E8FB99308F004A2EF58DA7291DB789948CB67
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00428347
    • IsBadWritePtr.KERNEL32(?,?,00000040,00433331,00000000,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000), ref: 00428393
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3_Write
    • String ID:
    • API String ID: 2657316581-0
    • Opcode ID: c087b852999587166c46a8a4236893e48d829c93f1dc4d25a417da905e2bf9af
    • Instruction ID: 567330286af23c6f8bc0b67e498089e91ebc585120acc4ec9674e2d7c5a3b4a5
    • Opcode Fuzzy Hash: c087b852999587166c46a8a4236893e48d829c93f1dc4d25a417da905e2bf9af
    • Instruction Fuzzy Hash: 5C21D331B011159FDF18DB28D851BBE73B0AF48B14FA4412EE902EB292DB79ED42C659
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_0002971D), ref: 0042973F
    • ExitProcess.KERNEL32 ref: 0042974A
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionExitFilterProcessUnhandled
    • String ID:
    • API String ID: 3348532846-0
    • Opcode ID: 24abb25775f5fec1219b7e538e4a702706e7778f2af124656529fca9ab045410
    • Instruction ID: ade9ea65ce32e02cadf791ee1ddca21d6396270c44cb8ee64c8b274f3ea8af1f
    • Opcode Fuzzy Hash: 24abb25775f5fec1219b7e538e4a702706e7778f2af124656529fca9ab045410
    • Instruction Fuzzy Hash: D7B09B34154204A7C6002FD1EC0E7483E54FF42742F404030F5054705199A158404E59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: |
    • API String ID: 0-2343686810
    • Opcode ID: f8447cf055629668ddc52d2fff55e4fa1f6f922df4fe10693531fd40a9f4c126
    • Instruction ID: b79a03227c7530e364f72badf1ec2b9e887904f8dd5e84781f1ecd57f7b17211
    • Opcode Fuzzy Hash: f8447cf055629668ddc52d2fff55e4fa1f6f922df4fe10693531fd40a9f4c126
    • Instruction Fuzzy Hash: 9C1271725083809ED730EB65C841BDFB7E8EF89318F000A2EF68967191DB786949CB57
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00017235), ref: 0041727C
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 06ac20b8896c4c79988b721c16f753ed6c14d060aa817415abac264c95fec94a
    • Instruction ID: 88cf47850b43bfd876af0391cc12ae75842832ada03b14d0f9fadb38a0c67953
    • Opcode Fuzzy Hash: 06ac20b8896c4c79988b721c16f753ed6c14d060aa817415abac264c95fec94a
    • Instruction Fuzzy Hash: 2B90027425514046461017716D0E74525A4FB8E74676108E5B155C5055EAA44081555B
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e46fba3fb5889573eefc4d888fa17b99230d7807b26c040d19d4b234ef011fa4
    • Instruction ID: 4761420ec8e5aef44b72d12d6ea3bc4efc4e911293f335b2d03100436b2d9809
    • Opcode Fuzzy Hash: e46fba3fb5889573eefc4d888fa17b99230d7807b26c040d19d4b234ef011fa4
    • Instruction Fuzzy Hash: 77728371A001158FDB38DF68C480A5E77B1BF84704F2141BAD916AB796DB34EC86CF99
    Memory Dump Source
    • Source File: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ce83530ecf9f629d5f29bd9a64fd24ef74a1485be62515c8988df02615564321
    • Instruction ID: 38c635e3b91ab457da0597f3e0c2f59a3ac6420ae1cf34bd1e585f6352f06dcd
    • Opcode Fuzzy Hash: ce83530ecf9f629d5f29bd9a64fd24ef74a1485be62515c8988df02615564321
    • Instruction Fuzzy Hash: BD31112145E7D08ED72BCB788566DA77FB0AE0322431B80EFC4C58F0B3DA19454AC75A
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction ID: 13894e8023581dbc7f90a609e0d06cfe84f7b44633e78d6a702d6051ea6d47fe
    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
    • Instruction Fuzzy Hash: 20113FB724008173D604C52DDBB45F7A396FAC5320B6C4367D341CB758E2AA99E19608
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 94d2d65dc791780a79f8e72f24a319ba3357e29369ae810294a6d907adb4f602
    • Instruction ID: d38f242198b0d15023108e7877089702408a8e3f5184e2581cd78cd7fed4c894
    • Opcode Fuzzy Hash: 94d2d65dc791780a79f8e72f24a319ba3357e29369ae810294a6d907adb4f602
    • Instruction Fuzzy Hash: C0F037B2529108BFF714CA94AE85BBBB7ADE704378F314A5AF000D2280D2F95E445524

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 4309 436a86-436b22 call 4020fc * 3 InternetOpenW 4316 436b91-436be3 InternetSetOptionW * 5 4309->4316 4317 436b24-436b8c GetLastError call 423a1f call 403c93 call 401938 call 40115a * 2 call 4018b3 4309->4317 4318 436be5-436be8 4316->4318 4319 436bea 4316->4319 4360 437099-4370bf call 410f21 4317->4360 4321 436bed-436bf0 4318->4321 4319->4321 4323 436bf2-436bf5 4321->4323 4324 436bf7 4321->4324 4326 436bfa-436c03 4323->4326 4324->4326 4328 436c05-436c08 4326->4328 4329 436c0a 4326->4329 4331 436c0d-436c2c InternetConnectW 4328->4331 4329->4331 4333 436c9b-436cc9 call 401801 4331->4333 4334 436c2e-436c90 GetLastError call 423a1f call 403c93 call 401938 call 40115a * 2 InternetCloseHandle 4331->4334 4342 436d85-436d8d 4333->4342 4343 436ccf-436cd8 4333->4343 4334->4333 4348 436d93-436e72 call 4239d1 call 403c02 call 403c48 call 403c02 call 436131 call 40115a * 4 4342->4348 4349 436e74-436e99 call 436131 4342->4349 4346 436cda-436cdd 4343->4346 4347 436cdf 4343->4347 4352 436ce2-436cff call 422d23 4346->4352 4347->4352 4366 436e9d-436eb4 call 4369d9 4348->4366 4349->4366 4352->4342 4367 436d05-436d80 GetLastError call 423a1f call 403c93 call 401938 call 40115a * 2 InternetCloseHandle * 2 call 4018b3 4352->4367 4379 437056-43705b 4366->4379 4380 436eba-436ebc 4366->4380 4392 43708a-437094 call 40173a 4367->4392 4381 437067-437085 InternetCloseHandle * 2 call 401424 4379->4381 4382 43705d-437061 CloseHandle 4379->4382 4380->4379 4385 436ec2 4380->4385 4381->4392 4382->4381 4389 436ec4-436ec6 4385->4389 4390 436ecc-436edb 4385->4390 4389->4379 4389->4390 4390->4379 4391 436ee1-436ee9 4390->4391 4395 437034-43703c 4391->4395 4396 436eef 4391->4396 4392->4360 4395->4379 4403 43703e-437046 4395->4403 4400 437026-43702e 4396->4400 4401 436ef5-436fdf call 4239d1 call 403c02 call 403c48 call 403c02 call 436131 call 40115a * 4 4396->4401 4400->4395 4400->4401 4437 436fe1 4401->4437 4438 437006-437012 4401->4438 4403->4379 4405 437048-437051 call 4020fc 4403->4405 4405->4379 4439 436fe3-436fe7 4437->4439 4440 436fe9-436ff7 4437->4440 4441 437016-43701e 4438->4441 4439->4438 4439->4440 4440->4395 4442 436ff9-437004 Sleep 4440->4442 4441->4401 4443 437024 4441->4443 4442->4441 4443->4395 4443->4400
    APIs
    • InternetOpenW.WININET(Downloader 15.4,00000000,00000000,00000000,00000000), ref: 00436B16
    • GetLastError.KERNEL32(?,0044668C,?,0044668C,39FCDDF2,?,00000000), ref: 00436B24
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
    • InternetSetOptionW.WININET(00000000,00000002,?,00000004), ref: 00436BA0
    • InternetSetOptionW.WININET(0044668C,00000005,?,00000004), ref: 00436BAE
    • InternetSetOptionW.WININET(0044668C,00000006,?,00000004), ref: 00436BBC
    • InternetSetOptionW.WININET(0044668C,00000007,?,00000004), ref: 00436BCA
    • InternetSetOptionW.WININET(0044668C,00000008,?,00000004), ref: 00436BD8
    • InternetConnectW.WININET(00000003,?,?,?,?,00000003,00000000,00000000), ref: 00436C20
    • GetLastError.KERNEL32(?,0044668C,?,0044668C,39FCDDF2,?,00000000), ref: 00436C2E
    • InternetCloseHandle.WININET(?), ref: 00436C90
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Internet$Option$ErrorLast$CloseConnectH_prolog3HandleOpen
    • String ID: Range: bytes=$Downloader 15.4$Error connecting #$Error creating file #$Error initializing inet #
    • API String ID: 283768418-3403237240
    • Opcode ID: 8940827807958eb46fdf6d11d1992215e2fde2d20c1c77c64691ae027404e6fe
    • Instruction ID: e345acf3af09ae2a895abddd20cfd8ace589afe853ec11aa0212e47a79e5dc10
    • Opcode Fuzzy Hash: 8940827807958eb46fdf6d11d1992215e2fde2d20c1c77c64691ae027404e6fe
    • Instruction Fuzzy Hash: DB0270B1508345AFD724EF10CC46B9BBBE8FF88714F00492EF689A7291D7749944CB9A

    Control-flow Graph

    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042A658
      • Part of subcall function 00435F29: __EH_prolog3.LIBCMT ref: 00435F30
      • Part of subcall function 00435B8E: __EH_prolog3_catch_GS.LIBCMT ref: 00435B98
      • Part of subcall function 00437385: __EH_prolog3.LIBCMT ref: 0043738C
    • GlobalAlloc.KERNEL32(00000002,?,?,?,0000EA60,00007530,00000198), ref: 0042A6A1
    • GlobalLock.KERNEL32(?,?,?), ref: 0042A6C3
    • CreateStreamOnHGlobal.OLE32(?,00000000,?), ref: 0042A6E6
    • GdipLoadImageFromStream.GDIPLUS(?,?), ref: 0042A6F9
    • GetSysColor.USER32(0000000F), ref: 0042A70E
    • GdipGetImageWidth.GDIPLUS(?,?), ref: 0042A728
    • GdipGetImageHeight.GDIPLUS(?,?), ref: 0042A73C
    • CreateCompatibleDC.GDI32(00000000), ref: 0042A743
    • CreateBitmap.GDI32(?,?,00000001,00000020,00000000), ref: 0042A759
    • SelectObject.GDI32(?,00000000), ref: 0042A766
    • GdipCreateFromHDC.GDIPLUS(?,?), ref: 0042A779
    • GdipCreateSolidFill.GDIPLUS(?,?,?,?), ref: 0042A7AD
    • GdipFillRectangleI.GDIPLUS(?,?,00000000,00000000,?,?,?,?,?,?), ref: 0042A7C6
    • GdipDrawImageRectI.GDIPLUS(?,?,00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,?,?), ref: 0042A7DF
    • GdipDeleteBrush.GDIPLUS(?,?,?,00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?,?), ref: 0042A7EA
    • GdipDeleteGraphics.GDIPLUS(?,?,?,?,00000000,00000000,?,?,?,?,00000000,00000000,?,?,?,?), ref: 0042A7F5
    • GdipDisposeImage.GDIPLUS(?,?,?,?,?,00000000,00000000,?,?,?,?,00000000,00000000,?,?), ref: 0042A800
    • GlobalUnlock.KERNEL32(?,?,?), ref: 0042A80B
    • GlobalFree.KERNEL32(?), ref: 0042A81D
    • GetHGlobalFromStream.OLE32(?,?), ref: 0042A82C
    • GlobalFree.KERNEL32(?), ref: 0042A838
      • Part of subcall function 00422518: SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000006,0042C11A), ref: 00422544
      • Part of subcall function 00422703: __CxxThrowException@8.LIBCMT ref: 0042271D
      • Part of subcall function 00422703: ShowWindow.USER32(?,?), ref: 0042272F
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Gdip$Global$CreateImage$FromStream$DeleteFillFreeH_prolog3Window$AllocBitmapBrushColorCompatibleDisposeDrawException@8GraphicsH_prolog3_H_prolog3_catch_HeightLoadLockObjectRectRectangleSelectShowSolidThrowUnlockWidth
    • String ID:
    • API String ID: 428748234-0
    • Opcode ID: 0853a5bd0d2108b4774a89c3d77312c2403263c63ede5dd0f23471f490362cc5
    • Instruction ID: d8d8824b47724f80831bbcfc15507b68e664ad8ea08a0f0072cf7299f80ebf8e
    • Opcode Fuzzy Hash: 0853a5bd0d2108b4774a89c3d77312c2403263c63ede5dd0f23471f490362cc5
    • Instruction Fuzzy Hash: 8E614B71900128AFDF21AFA1DD46BDDBB75EF09304F4040AAF608B6161DBB4AAD4CF58
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 004254DB
    • LoadLibraryW.KERNEL32(wuapi.dll,00000088), ref: 004254E5
    • EnumResourceNamesW.KERNEL32(00000000,0000000E,Function_00022C97,00000000), ref: 004254F8
    • GetTickCount.KERNEL32 ref: 004254FE
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
    • GetModuleHandleW.KERNEL32 ref: 0042554A
    • LoadImageW.USER32(00000000,00000001,00000000,00000000,00008040), ref: 00425563
    • RegisterClassExW.USER32(00000030), ref: 0042558B
    • CreateWindowExW.USER32(00000080,FFFF8300,Windows Update,10000000,FFFF8300,FFFF8300,00000000,00000000,00000000,00000000,?,00000000), ref: 004255BD
    • SetTimer.USER32(00000000,000001BC,00000064,00000000), ref: 004255D0
    • DispatchMessageW.USER32(?), ref: 004255E7
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 004255F4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: LoadMessage$ClassCountCreateDispatchEnumH_prolog3H_prolog3_HandleImageLibraryModuleNamesRegisterResourceTickTimerWindow
    • String ID: 0$Window #$Windows Update$wuapi.dll
    • API String ID: 2433587882-613691514
    • Opcode ID: 4a46c62a93c50d22449711e8a630047eb6c674d6a799535a8aad455cbd9f672d
    • Instruction ID: 5460e4a41303b39ece6203e3126ed181bc892b5ce7a8d4e1cd37aa09c422b44f
    • Opcode Fuzzy Hash: 4a46c62a93c50d22449711e8a630047eb6c674d6a799535a8aad455cbd9f672d
    • Instruction Fuzzy Hash: AD318E75A00654ABDB209FA5EC49EAFBFB9FBC6B01F50002AF511F6191C7B44945CB28
    APIs
      • Part of subcall function 004280BA: GetModuleFileNameW.KERNEL32(00000000,?,00002000,39FCDDF2,?,?,?,?,0043FA29,000000FF), ref: 0042814A
    • SetFileAttributesW.KERNEL32(-00000004,00000080,39FCDDF2,?,?,?,?,0043FFCA,000000FF), ref: 00428A4E
    • ExitProcess.KERNEL32 ref: 00428A92
      • Part of subcall function 00423C55: SHGetFolderPathW.SHELL32(00000000,00000025,00000000,00000000,?), ref: 00423CC5
    • GetEnvironmentVariableW.KERNEL32(ComSpec,?,00002000,00000001,00000000,?,?,?,?,0043FFCA,000000FF), ref: 00428ADB
    • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,0043FFCA,000000FF), ref: 00428AF4
    • _memset.LIBCMT ref: 00428C91
    • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00428CF8
    • CloseHandle.KERNEL32(?), ref: 00428D0A
    • CloseHandle.KERNEL32(?), ref: 00428D12
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Process$CloseFileHandle$AttributesCreateCurrentEnvironmentExitFolderModuleNamePathVariable_memset
    • String ID: & for /l %x in (1,1,60) do ping 127.0.0.1 -n 2 -w 500 & del /q /f "$" & if not exist "$" /c taskkill /f /pid $" exit$ComSpec$\cmd.exe
    • API String ID: 3954325587-4250694363
    • Opcode ID: 530aafe55c8316273a5be5f33609d016cbf573f62ece8c34274688bf958c961a
    • Instruction ID: bfa74545eadc1b3e2da160707e802f852e731fde79e3f73e950f5c187d9d6adb
    • Opcode Fuzzy Hash: 530aafe55c8316273a5be5f33609d016cbf573f62ece8c34274688bf958c961a
    • Instruction Fuzzy Hash: EC8173F2C04128EADB20EBA5EC45ACE77BCAF55305F0141EAF709B3151DA785F848B69
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042842A
      • Part of subcall function 004235EB: GetFileAttributesW.KERNEL32(?,00428438,0000010C,00428781), ref: 004235FA
    • SetFileAttributesW.KERNEL32(?,00000080,0000010C,00428781), ref: 00428462
    • DeleteFileW.KERNEL32(?), ref: 00428475
    • EqualSid.ADVAPI32(?,00000000), ref: 00428498
    • SetFileAttributesW.KERNEL32(?,00000080), ref: 004284E6
    • DeleteFileW.KERNEL32(?), ref: 004284F5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$Attributes$Delete$EqualH_prolog3_
    • String ID: .deleted$.tmp
    • API String ID: 3777896678-1424427048
    • Opcode ID: e644fc855331ae772839b9e87ab9b0e74c0af5c700362eb8cc16c24ff1cd9df4
    • Instruction ID: 94486d4109dcde665c55cf9131262e63acee57fdcfd50bd7ff89a8f56c02b02b
    • Opcode Fuzzy Hash: e644fc855331ae772839b9e87ab9b0e74c0af5c700362eb8cc16c24ff1cd9df4
    • Instruction Fuzzy Hash: 7C91B271A01128EFDB10EBA4DC45BDEB778BF15305F90406AF101B7191DBB85E89CBA9
    APIs
    • GetModuleHandleW.KERNEL32(KERNEL32.DLL,0044D218,0000000C,00415057,00000000,00000000,?,00401267,00000001,?,?,?,00401113,00000000), ref: 00414F2E
    • __crt_waiting_on_module_handle.LIBCMT ref: 00414F39
      • Part of subcall function 004153F5: Sleep.KERNEL32(000003E8,00000000,?,00414E7F,KERNEL32.DLL,?,00414ECB,?,00401267,00000001,?,?,?,00401113,00000000), ref: 00415401
      • Part of subcall function 004153F5: GetModuleHandleW.KERNEL32(00000000,?,00414E7F,KERNEL32.DLL,?,00414ECB,?,00401267,00000001,?,?,?,00401113,00000000), ref: 0041540A
    • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 00414F62
    • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00414F72
    • __lock.LIBCMT ref: 00414F94
    • InterlockedIncrement.KERNEL32(?), ref: 00414FA1
    • __lock.LIBCMT ref: 00414FB5
    • ___addlocaleref.LIBCMT ref: 00414FD3
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
    • String ID: DecodePointer$EncodePointer$KERNEL32.DLL$hYE$Lw
    • API String ID: 1028249917-3438387428
    • Opcode ID: 44293b2d78c92c397cf48cfd1c0b33f3d1f6aa59410f6948ce821dff737b64e2
    • Instruction ID: 82288082162e1c50b92b8a5e0cc7482902ccfe26943c861a3abad2a401921760
    • Opcode Fuzzy Hash: 44293b2d78c92c397cf48cfd1c0b33f3d1f6aa59410f6948ce821dff737b64e2
    • Instruction Fuzzy Hash: 0C116371900B01EFD7209F76D901BDABBE0AF84358F10451FE4A597391DBB89981CF59
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 0043961C
      • Part of subcall function 00425FD5: RegOpenKeyExW.ADVAPI32(?,?,00000000,00000109,39FCDDF2,39FCDDF2), ref: 00426027
    • __CxxThrowException@8.LIBCMT ref: 00439947
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
      • Part of subcall function 004249B3: __EH_prolog3_GS.LIBCMT ref: 004249BA
      • Part of subcall function 004249B3: RegOpenKeyExW.ADVAPI32(?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080,00424ED6,?,0000003C,00427D3D,?,00000001), ref: 004249EC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Open$Exception@8H_prolog3H_prolog3_H_prolog3_catch_Throw
    • String ID: $@kD$B$Install$SOFTWARE\Microsoft\NET Framework Setup\NDP$SOFTWARE\Microsoft\NET Framework Setup\NDP\$Version$error getting version$hkD$version not installed
    • API String ID: 2274932691-4079712116
    • Opcode ID: a5b71483e2bb615e203d1ef9e5fcf7f6261c8949a475bc49ce7f38d7407bd22b
    • Instruction ID: 79d33f92d92982e5a20b6248d3e43f1b4e94bb9b59c6040d3bb8c364d792c493
    • Opcode Fuzzy Hash: a5b71483e2bb615e203d1ef9e5fcf7f6261c8949a475bc49ce7f38d7407bd22b
    • Instruction Fuzzy Hash: C2E19271D44268AEEF10EBA5CC06BCDB778AF05318F1141AAE505772D2C7B81F49CB59
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00427314
    • GetVersion.KERNEL32(000000AC,0043CC41,?,?,00000024,0043279F,?,?,00000001,00000000,00000001,00000000,00000001,00000000,00000001,00000000), ref: 0042733D
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 004028E7: std::_String_base::_Xlen.LIBCPMT ref: 00402920
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_String_base::_VersionXlenstd::_
    • String ID: ROOT\SecurityCenter$ROOT\SecurityCenter2$displayName$false$onAccessScanningEnabled$productState$productUptoDate$true
    • API String ID: 290633416-770048900
    • Opcode ID: d41c7935fba98f4c6b230c3a5b239ac48feb07db88f682d74f65f250109ccb34
    • Instruction ID: 37fb866910444abc22e4376f24897a2dacf7335f726b8aefeea7b993e8257393
    • Opcode Fuzzy Hash: d41c7935fba98f4c6b230c3a5b239ac48feb07db88f682d74f65f250109ccb34
    • Instruction Fuzzy Hash: 39F1A371D04258EEDB00EBA5DD42BCDBBB8AF04308F50416BF504B7292DB786E49CB69
    APIs
    • __EH_prolog3_catch.LIBCMT ref: 004293AA
    • ReadFile.KERNEL32(000000FF,00000000,00002800,00000001,00000000,00000001,00000000,000000A8,0043868E,?,00000001,00000000,?,?,?,00000000), ref: 0042948B
    • CloseHandle.KERNEL32(000000FF,?,?,?,00000000,00000001,00000000), ref: 0042949D
      • Part of subcall function 00428420: __EH_prolog3_GS.LIBCMT ref: 0042842A
    • __CxxThrowException@8.LIBCMT ref: 004294D0
    • WriteFile.KERNEL32(00000000,?,00000000,00000000,000000A8,0043868E,?,00000001,00000000,?,?,?,00000000,00000001,00000000), ref: 00429534
    • CloseHandle.KERNEL32(00000000,?,?,?,00000000,00000001,00000000,?,?,?,00000000), ref: 00429549
    • CloseHandle.KERNEL32(00000000,?,?,?,00000000,00000001,00000000,?,?,?,00000000), ref: 00429557
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseHandle$File$Exception@8H_prolog3_H_prolog3_catchReadThrowWrite
    • String ID: contents is empty$error opening file for writing$error writing file
    • API String ID: 3802985790-980197760
    • Opcode ID: c6785eb483391c74fd5098ca18a0bd07f21f9ec9958e1283337747fdd23df3ca
    • Instruction ID: c499336e5903cdbeda77786f90ce156a2c605bc3cf6368f1b586da11f95b3dac
    • Opcode Fuzzy Hash: c6785eb483391c74fd5098ca18a0bd07f21f9ec9958e1283337747fdd23df3ca
    • Instruction Fuzzy Hash: 2941E570A00215EBDF20AF90ED85AAE3774AB04319F51412FF50577191DB7C9E8A8BAD
    APIs
    • GetStockObject.GDI32(00000011), ref: 004225A7
    • GetObjectW.GDI32(00000000), ref: 004225AE
    • CreateFontIndirectW.GDI32(00457AD8), ref: 004225BB
      • Part of subcall function 00410FD3: _malloc.LIBCMT ref: 00410FED
    • CreateFontIndirectW.GDI32(00000000), ref: 004225E3
    • GetDC.USER32(00000000), ref: 004225F3
    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00422604
    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0042260C
    • ReleaseDC.USER32(00000000,00000000), ref: 00422630
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CapsCreateDeviceFontIndirectObject$ReleaseStock_malloc
    • String ID: `$`
    • API String ID: 3131621926-197956300
    • Opcode ID: 8411d493171a9919d275dc0abc82d7d29780461aeed5843754097c37d7e27448
    • Instruction ID: 12cff05635d641eb86cb9a90f7d0b8ef8bbe484d6eb2b0aaeb93e7f5bf862572
    • Opcode Fuzzy Hash: 8411d493171a9919d275dc0abc82d7d29780461aeed5843754097c37d7e27448
    • Instruction Fuzzy Hash: 9211D531A04714BAE7105B61FC0AB9B7FB8EB42756F10407AF60097291DBF48D80CBA8
    APIs
      • Part of subcall function 00423391: GetFileInformationByHandle.KERNEL32(00000000,?), ref: 004233C8
      • Part of subcall function 00423391: CloseHandle.KERNEL32(00000000), ref: 004233D3
      • Part of subcall function 00428420: __EH_prolog3_GS.LIBCMT ref: 0042842A
    • ReadFile.KERNEL32(00000000,?,00000001,?,00000000), ref: 00429215
    • WriteFile.KERNEL32(00000000,0044963C,00000002,?,00000000), ref: 0042926F
    • WriteFile.KERNEL32(?,00000000,00000001,00000002,00000000), ref: 0042930F
    • ReadFile.KERNEL32(?,00000000,00002800,00000001,00000000), ref: 0042932E
    • CloseHandle.KERNEL32(?), ref: 00429351
    • CloseHandle.KERNEL32(00000000), ref: 00429356
    • CloseHandle.KERNEL32(?), ref: 00429373
    • CloseHandle.KERNEL32(?), ref: 00429378
    • CloseHandle.KERNEL32(00000000), ref: 0042938D
    • CloseHandle.KERNEL32(00000000), ref: 00429393
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Handle$Close$File$ReadWrite$H_prolog3_Information
    • String ID:
    • API String ID: 1382214879-0
    • Opcode ID: e656f4156428187a173738d29ab683d422b60f0a622d144b15d6b0de2819b911
    • Instruction ID: 050427443aee3d82095ed406c55a72470e7cb8746b3ac540782cebb113b924b2
    • Opcode Fuzzy Hash: e656f4156428187a173738d29ab683d422b60f0a622d144b15d6b0de2819b911
    • Instruction Fuzzy Hash: 1B51C231E00129ABDF11DBA5EC45AEEBBB8AF49314F5040ABF410A7291D7785D45CBA8
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042AB88
      • Part of subcall function 00435F29: __EH_prolog3.LIBCMT ref: 00435F30
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 00403C48: __EH_prolog3.LIBCMT ref: 00403C4F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$H_prolog3_
    • String ID: ": $&launch=$?$?launch=$PjE$TjE$url error in "
    • API String ID: 4240126716-1053040137
    • Opcode ID: eba47c347315baddd24db417edff6d711efa8a1f48a577d12cd3f33d3691a648
    • Instruction ID: b0b2451c5177eac9f8d2dceeeb4dd1921bb835145c97ab9c96c0acf479e1851c
    • Opcode Fuzzy Hash: eba47c347315baddd24db417edff6d711efa8a1f48a577d12cd3f33d3691a648
    • Instruction Fuzzy Hash: 91916072D00198AADB11EBA5CD45FCFBB7CAF55308F1040EBA509B7182DA781F48CB65
    APIs
    • __EH_prolog3.LIBCMT ref: 00437B52
    • _memset.LIBCMT ref: 00437B61
    • StrCpyW.SHLWAPI(00000006,?), ref: 00437BF8
    • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,00000000,00000000,?,00000044,?), ref: 00437C4E
    • GetLastError.KERNEL32 ref: 00437C58
    • CloseHandle.KERNEL32(?), ref: 00437CB9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseCreateErrorH_prolog3HandleLastProcess_memset
    • String ID: D$launch error #
    • API String ID: 3881325696-3841159381
    • Opcode ID: c9e0921abe146f78281791c5e0d2ac6145bbf0277634c0c3f7a49750d846131a
    • Instruction ID: e6b6a4e338da09818773bc92c7b710c1915182cf0bb27cc5a99d9f5e3e3845c2
    • Opcode Fuzzy Hash: c9e0921abe146f78281791c5e0d2ac6145bbf0277634c0c3f7a49750d846131a
    • Instruction Fuzzy Hash: 8441B171500704EBEB24DB68DD46BEAB7B4FF08304F10845EF686EB191EB78A944CB59
    APIs
    • std::_String_base::_Xlen.LIBCPMT ref: 0040C2FC
    • std::_String_base::_Xlen.LIBCPMT ref: 0040C316
      • Part of subcall function 004014A5: char_traits.LIBCPMT ref: 004014F5
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: String_base::_Xlenstd::_$char_traits
    • String ID:
    • API String ID: 2464655862-0
    • Opcode ID: ddffe54e627ffcae5f1f92ddaf923047b508ce389b70aa4c5bf4a9740ee26386
    • Instruction ID: abf77cf8a35d1bbb903483302f472247232789562c45f06b82104373d1a2b65c
    • Opcode Fuzzy Hash: ddffe54e627ffcae5f1f92ddaf923047b508ce389b70aa4c5bf4a9740ee26386
    • Instruction Fuzzy Hash: 00E1DE30604700CBD734CF29CAC066AB7E6AB52714F204B3FD456A7BD2C779A949C79A
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 004249BA
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080,00424ED6,?,0000003C,00427D3D,?,00000001), ref: 004249EC
    • RegQueryValueExW.ADVAPI32(?,00000002,00000000,?,00000000,?,?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080), ref: 00424A26
    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080,00424ED6,?,0000003C,00427D3D,?), ref: 00424A33
    • RegQueryValueExW.ADVAPI32(?,00000002,00000000,00000000,?,?,?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080), ref: 00424A85
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 004028E7: std::_String_base::_Xlen.LIBCPMT ref: 00402920
    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080,00424ED6,?,0000003C,00427D3D,?), ref: 00424AC1
    • RegQueryValueExW.ADVAPI32(?,00000002,00000000,00000000,00000000,?,?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080), ref: 00424B0F
    • RegQueryValueExW.ADVAPI32(?,00000002,00000000,00000000,00000000,?,?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080), ref: 00424BE1
    • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,00000101,?,0000006C,00424E09,?,?,00000080,00424ED6,?,0000003C), ref: 00424C4F
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: QueryValue$Close$H_prolog3H_prolog3_OpenString_base::_Xlenstd::_
    • String ID:
    • API String ID: 3853482186-0
    • Opcode ID: 15284a5198c7a7aa7c1ca405b53113921b39c28d63f12e51a4e204f1a52e2bcb
    • Instruction ID: 1f7b110a2c94fe0a0e1b5cd92eb58a35b8a593453837bf108f1d93ce0c802a44
    • Opcode Fuzzy Hash: 15284a5198c7a7aa7c1ca405b53113921b39c28d63f12e51a4e204f1a52e2bcb
    • Instruction Fuzzy Hash: 6391AF71A00158EFDF14DBE5DD85AEEBB78EF44304F50402AE101BB2A5D6786E45CB68
    APIs
    • CopyFileW.KERNEL32(?,?,00000000), ref: 00428762
    • WriteFile.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 004287D9
    • CloseHandle.KERNEL32(00000000), ref: 004287EC
      • Part of subcall function 00423391: GetFileInformationByHandle.KERNEL32(00000000,?), ref: 004233C8
      • Part of subcall function 00423391: CloseHandle.KERNEL32(00000000), ref: 004233D3
    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00428850
    • ReadFile.KERNEL32(?,00000000,00002800,00000000,00000000), ref: 00428871
    • CloseHandle.KERNEL32(?), ref: 00428887
    • CloseHandle.KERNEL32(?), ref: 0042888C
    • CloseHandle.KERNEL32(?), ref: 004288A5
    • CloseHandle.KERNEL32(?), ref: 004288AA
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Handle$Close$File$Write$CopyInformationRead
    • String ID:
    • API String ID: 956385400-0
    • Opcode ID: 5f38c79efe69577a203c2a8ec649800071ba8a9a9e5ef5a5135e164d828be187
    • Instruction ID: f790a05e7773238940d0e59789fa7fe84bd38f94ec0b5889cdc0f2cf6087f2ed
    • Opcode Fuzzy Hash: 5f38c79efe69577a203c2a8ec649800071ba8a9a9e5ef5a5135e164d828be187
    • Instruction Fuzzy Hash: 6951C330701224EBDB10EF61EC85BAE77B8AB40345FA0416EF40197291DF78EE41CBA8
    APIs
    • GetCurrentProcess.KERNEL32(00000008,?), ref: 00422D97
    • OpenProcessToken.ADVAPI32(00000000), ref: 00422D9E
    • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,00000000,?), ref: 00422DC1
    • CloseHandle.KERNEL32(?), ref: 00422DCB
    • GetTokenInformation.ADVAPI32(?,00000001(TokenIntegrityLevel),00000000,?,?), ref: 00422DF1
    • CloseHandle.KERNEL32(?), ref: 00422DFA
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Token$CloseHandleInformationProcess$CurrentOpen
    • String ID:
    • API String ID: 3748835715-0
    • Opcode ID: edb99d315137f7fa00bc1440a480e8676241f0c9aebf6afe2908221f6df246b7
    • Instruction ID: c5c2ac9318769611665d3196b53f46ca3038e29cf372df8f722734cc3cf763df
    • Opcode Fuzzy Hash: edb99d315137f7fa00bc1440a480e8676241f0c9aebf6afe2908221f6df246b7
    • Instruction Fuzzy Hash: 1721B271614205FFDF119FA1FD45E9E7B78EB48741B10407AF201E2120DBB58A92EB18
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00435B98
      • Part of subcall function 00423A5B: CharLowerW.USER32(00000000), ref: 00423AB0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharH_prolog3_catch_Lower
    • String ID: /$:$://$file$ftp$https
    • API String ID: 2430393206-822448976
    • Opcode ID: 0cdd6edff95402b6c08ed9c6cd1fb8f5cc222fd273532b868b99ea5027ac26ef
    • Instruction ID: a85455edcd8c20c8b39de3779d66f067a2f91094578c5dd318cc09920a7048d4
    • Opcode Fuzzy Hash: 0cdd6edff95402b6c08ed9c6cd1fb8f5cc222fd273532b868b99ea5027ac26ef
    • Instruction Fuzzy Hash: A8B16471940258AADB00EBF5CD46BDEB778BF14318F20422BF215B71D2D7B86A09CB59
    APIs
    • __CxxThrowException@8.LIBCMT ref: 004229DC
    • AdjustWindowRectEx.USER32(?,?,00000000,?), ref: 00422A49
    • GetModuleHandleW.KERNEL32(00000000,00000000), ref: 00422A9D
    • CreateWindowExW.USER32(00000000,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00422ABD
    • SetWindowLongW.USER32(00000000,000000FC,Function_000228BC), ref: 00422AE6
      • Part of subcall function 0042256D: SendMessageW.USER32(?,00000030,00000000,00000001), ref: 0042258B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Window$AdjustCreateException@8HandleLongMessageModuleRectSendThrow
    • String ID: Can't create window$Window already created
    • API String ID: 622255427-1993262928
    • Opcode ID: 899ff7d354281c6c286764c2674dcbb1787b9291edd878a5f6f7d7861d18d68b
    • Instruction ID: 77ca372c1c9b3fe44e9830025362e791add2570699165d1b18934fa42ca2373d
    • Opcode Fuzzy Hash: 899ff7d354281c6c286764c2674dcbb1787b9291edd878a5f6f7d7861d18d68b
    • Instruction Fuzzy Hash: CD4107B5A0030AAFCF10DFA8DA45AAE7BB4FB48704F50452EF911A2250D7B4E960CF64
    APIs
    • GetModuleHandleW.KERNEL32(00000000), ref: 00422B37
    • LoadCursorW.USER32(00000000,00007F00), ref: 00422B4C
    • RegisterClassExW.USER32(00000030), ref: 00422B6C
    • __CxxThrowException@8.LIBCMT ref: 00422B8F
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ClassCursorExceptionException@8HandleLoadModuleRaiseRegisterThrow
    • String ID: 0$Can't register window class$WindowClass
    • API String ID: 366208366-109779466
    • Opcode ID: d74077d215c52488cd5954fb8187811911165eb6663f0a13c90e0fc4c0100b41
    • Instruction ID: 1e88683638b6ad808ca634f3e9ea07c79d46cd4356ab9651d57651dc5e8b9b4d
    • Opcode Fuzzy Hash: d74077d215c52488cd5954fb8187811911165eb6663f0a13c90e0fc4c0100b41
    • Instruction Fuzzy Hash: D8111EB4D01319AFDB00DFA9E985ADEBBB4BB18304F50806EE815E7301D7B89544CF58
    APIs
    • LoadLibraryW.KERNEL32(wuapi.dll), ref: 00422CCD
    • LoadStringW.USER32(00000000,0000F815,?,00001000), ref: 00422CE1
    • LoadLibraryW.KERNEL32(user32.dll), ref: 00422CEE
    • GetProcAddress.KERNEL32(00000000,ShutdownBlockReasonCreate), ref: 00422CF6
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Load$Library$AddressProcString
    • String ID: ShutdownBlockReasonCreate$user32.dll$wuapi.dll
    • API String ID: 1125239459-523537308
    • Opcode ID: a2bae14822e4ed2b2ab5b06ad7894077b4c432f01517652f4073b649f36549e2
    • Instruction ID: c85e93ba308b7d6e8e80a5bba46143728bd7f4e36338d6ba0a56aed618e5716e
    • Opcode Fuzzy Hash: a2bae14822e4ed2b2ab5b06ad7894077b4c432f01517652f4073b649f36549e2
    • Instruction Fuzzy Hash: 98F0C830711318BAE7149BA4AD8ABAA3768EB48B44B54006A7205D3182DEE89900CB5C
    APIs
      • Part of subcall function 00435F29: __EH_prolog3.LIBCMT ref: 00435F30
      • Part of subcall function 00435B8E: __EH_prolog3_catch_GS.LIBCMT ref: 00435B98
    • SetEvent.KERNEL32(00000001,00000000,004569FC,000000FF), ref: 0042A99B
    • EnterCriticalSection.KERNEL32(00457A68,00000001,00000000,00000001,00000000,?,00000001,00000000,?), ref: 0042AA5E
    • LeaveCriticalSection.KERNEL32(00457A68,?,00000001), ref: 0042AB38
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalSection$EnterEventH_prolog3H_prolog3_catch_Leave
    • String ID: hzE$magnet$torrent
    • API String ID: 3599823906-2277201331
    • Opcode ID: 64fa015290da568950a3b0b298c622330ccd40277fc735f7ff2096bc74f10a49
    • Instruction ID: d63e5322370e08daa2024bf05242eb49d941c1a5a651088f5a839bf88753bffb
    • Opcode Fuzzy Hash: 64fa015290da568950a3b0b298c622330ccd40277fc735f7ff2096bc74f10a49
    • Instruction Fuzzy Hash: 3061C2711483819ED320EB21DC42BDBB7E8AF94318F50493EF99563192DB785948C79B
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00436759
      • Part of subcall function 00436036: __EH_prolog3.LIBCMT ref: 0043603D
      • Part of subcall function 00423A5B: CharLowerW.USER32(00000000), ref: 00423AB0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharH_prolog3H_prolog3_Lower
    • String ID: "';$/$=$Content-Disposition$filename
    • API String ID: 2243128287-494049755
    • Opcode ID: bd39ee2b9ac27c8b32b444be46a667f711af01f0ab80cb5cd0fe6cc5649c4091
    • Instruction ID: 1aaf431a549395a0e453bd523683bc8aba19b3dde4240d14128bf6b44f2e0f05
    • Opcode Fuzzy Hash: bd39ee2b9ac27c8b32b444be46a667f711af01f0ab80cb5cd0fe6cc5649c4091
    • Instruction Fuzzy Hash: 8951B571C00249EADF15EBE5CC85ADEB7B8AF19318F20822FE115B71D1DA785A49CB24
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00424264
    • AssocQueryStringW.SHLWAPI(00000000,00000002,?,open,00000000,?), ref: 004242AF
    • AssocQueryStringW.SHLWAPI(00000000,00000002,?,open,?,?), ref: 004242FD
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AssocQueryString$H_prolog3_
    • String ID: P6[wPO[w$open$openwith.exe
    • API String ID: 1923178052-3303953555
    • Opcode ID: 00274e83b94ca68080dce9821f2ac28c80ba471a6b412828fe76469c7b236dc2
    • Instruction ID: 6736dbcd582ec8e4ae5b9a2a578b3cb28a4551e7bafae1446478841ee3eb690c
    • Opcode Fuzzy Hash: 00274e83b94ca68080dce9821f2ac28c80ba471a6b412828fe76469c7b236dc2
    • Instruction Fuzzy Hash: 8F51AF71E00258DEDB10EBE5D842ADEBBB4EF44304F51812EF105BB191D7B85A45CB69
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00437180
      • Part of subcall function 00425C6F: __EH_prolog3.LIBCMT ref: 00425C76
      • Part of subcall function 0040450F: __EH_prolog3.LIBCMT ref: 00404516
      • Part of subcall function 0040455A: __EH_prolog3.LIBCMT ref: 00404561
      • Part of subcall function 004045A0: __EH_prolog3.LIBCMT ref: 004045A7
      • Part of subcall function 004358F2: __EH_prolog3.LIBCMT ref: 004358F9
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 004370C2: __EH_prolog3.LIBCMT ref: 004370C9
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$H_prolog3_char_traits
    • String ID: --$Content-Disposition: form-data; name="data"$--$Content-Type: multipart/form-data; boundary=$POST
    • API String ID: 3359205163-1235690780
    • Opcode ID: ad88e66aff44dce27a31cf96aae021ed0412891ec0555731e8ef406c525fb72a
    • Instruction ID: e7753f40369bbc4c240e8d2708e11ea4ecb790749250e56328578bbca1c7244b
    • Opcode Fuzzy Hash: ad88e66aff44dce27a31cf96aae021ed0412891ec0555731e8ef406c525fb72a
    • Instruction Fuzzy Hash: 6C4144B1C01158BBDB11EBA5DC86ECF7B7CAF54304F1081AAF146B3181EA781B08CB65
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042B02C
    • Sleep.KERNEL32(0000EA60,00000190,?,?,?,?,?,?,?,?,?,00000070), ref: 0042B046
      • Part of subcall function 00437176: __EH_prolog3_GS.LIBCMT ref: 00437180
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    • ExitProcess.KERNEL32 ref: 0042B1F7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3_$ExitProcessSleepchar_traits
    • String ID: /launch_info$0x004000e0$PjE
    • API String ID: 3576841262-23861177
    • Opcode ID: fb839f6436a7b063bccc6105032628822820b41e910f12458f124e8310ef531e
    • Instruction ID: 59c4de022c657c2c658c475c494945ca9cf309bd3d3e158606bb8eb7d533e7d8
    • Opcode Fuzzy Hash: fb839f6436a7b063bccc6105032628822820b41e910f12458f124e8310ef531e
    • Instruction Fuzzy Hash: 9A41F970904268BEDB21EB659C46BCE7B74AF16304F5081EAF119772D2CAB81F88CB55
    APIs
      • Part of subcall function 00436964: __EH_prolog3_GS.LIBCMT ref: 0043696B
    • PostMessageW.USER32(00000402,00000000,00000000), ref: 0042A5C2
    • SetTimer.USER32(?,00000002,000003E8,Function_0002A1AA), ref: 0042A63E
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3_MessagePostTimer
    • String ID:
    • API String ID: 3213910739-0
    • Opcode ID: fd128f7fbee9ce2204b2b77ad79c9484968371dadfd14c3e57681c4f780ccdc7
    • Instruction ID: 0b18581d3765697a9f55c95455699c8ad95f80b6eb321c80718b170a280a7112
    • Opcode Fuzzy Hash: fd128f7fbee9ce2204b2b77ad79c9484968371dadfd14c3e57681c4f780ccdc7
    • Instruction Fuzzy Hash: A0314DB0748330BBDB109F64FD45E2A3B69AB45B11B50423BF905C32E2CB3D88418B6E
    APIs
    • OleCreate.OLE32(00444710,00444700,00000001,00000000,0042D647,00000000,0042D65F), ref: 004378C6
    • __CxxThrowException@8.LIBCMT ref: 004378E6
    • OleSetContainedObject.OLE32(0042D65F,00000001), ref: 004378F9
    Strings
    • QueryInterface(IWebBrowser) failed, xrefs: 00437944
    • OleCreate() failed, xrefs: 004378D0
    • DoVerb(OLEIVERB_INPLACEACTIVATE) failed, xrefs: 00437927
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ContainedCreateException@8ObjectThrow
    • String ID: DoVerb(OLEIVERB_INPLACEACTIVATE) failed$OleCreate() failed$QueryInterface(IWebBrowser) failed
    • API String ID: 3259990851-713879003
    • Opcode ID: 8db5b6c664b919d33b929c77047db62e55e34bc4b144ae35385a25aff6604017
    • Instruction ID: 99e76b4c292bceafdeb734a20d47ec22bcfeb251776d4d62147da273049fd577
    • Opcode Fuzzy Hash: 8db5b6c664b919d33b929c77047db62e55e34bc4b144ae35385a25aff6604017
    • Instruction Fuzzy Hash: B021C371604324ABEB20DF64CC89F973778EF4A720F104916F905AB2D0C7B5E801C769
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0042415C
      • Part of subcall function 00435F29: __EH_prolog3.LIBCMT ref: 00435F30
    • DefWindowProcW.USER32(?,?,?,?,?,0000EA60,00007530,00000150), ref: 00424206
      • Part of subcall function 004230E1: GetSystemMetrics.USER32(00002000), ref: 004230E6
    • SetEvent.KERNEL32(?,0000EA60,00007530,00000150), ref: 004241BA
    • ResetEvent.KERNEL32 ref: 004241C6
    • ResetEvent.KERNEL32(?,0000EA60,00007530,00000150), ref: 004241E4
    • SetEvent.KERNEL32 ref: 004241F0
    • SetEvent.KERNEL32(?,0000EA60,00007530,00000150), ref: 00424221
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Event$Reset$H_prolog3H_prolog3_MetricsProcSystemWindow
    • String ID:
    • API String ID: 3056946317-0
    • Opcode ID: 08f64fad535afbc3c73dce2e94f254fc3bec98ad2239babc29fde4783dd26284
    • Instruction ID: 2990bff95d7c41b356380f8b20639e4bb3bd6eca5ba16e7d6960f385ab0fd4b2
    • Opcode Fuzzy Hash: 08f64fad535afbc3c73dce2e94f254fc3bec98ad2239babc29fde4783dd26284
    • Instruction Fuzzy Hash: 6721F734A08360EFD7129BA1FC086AD3B60EB96706F444077F80186272C7B99AD1C76D
    APIs
    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00000109,39FCDDF2,39FCDDF2), ref: 00426027
    • RegQueryInfoKeyW.ADVAPI32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0042605D
    • RegCloseKey.ADVAPI32(?), ref: 0042606B
    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?), ref: 004260C6
    • RegCloseKey.ADVAPI32(?,?,?), ref: 00426127
    • RegCloseKey.ADVAPI32(?), ref: 00426171
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Close$EnumInfoOpenQuery
    • String ID:
    • API String ID: 1383594502-0
    • Opcode ID: 4fd19bc15858fce6e64bfb942bb50020238f86e4dbc29ee7211a6158c35f2d3c
    • Instruction ID: 31be56774b01b39b4d2722298ac3367537a3d6aee57d6ad37a955b20885b5dd0
    • Opcode Fuzzy Hash: 4fd19bc15858fce6e64bfb942bb50020238f86e4dbc29ee7211a6158c35f2d3c
    • Instruction Fuzzy Hash: C3417872108304AFD701EF25EC41A6BBBE8FF88358F00092EF595A61A1DB34DD55DB5A
    APIs
    • GetFileAttributesW.KERNEL32(?), ref: 0042965A
    • SetFileAttributesW.KERNEL32(?,00000080), ref: 00429675
    • MoveFileExW.KERNEL32(?,?,00000003), ref: 0042969C
    • SetFileAttributesW.KERNEL32(?,?), ref: 004296C0
    • GetFileAttributesW.KERNEL32(?), ref: 004296DA
    • SetFileAttributesW.KERNEL32(?,?), ref: 00429705
      • Part of subcall function 00423391: GetFileInformationByHandle.KERNEL32(00000000,?), ref: 004233C8
      • Part of subcall function 00423391: CloseHandle.KERNEL32(00000000), ref: 004233D3
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: File$Attributes$Handle$CloseInformationMove
    • String ID:
    • API String ID: 3710066108-0
    • Opcode ID: f62f06324d02b773c6e34212ff886f3ffc0e0fc6ae11a8594068b945bbad2b02
    • Instruction ID: 0ea27349206e9bca829748aed3258ba1ecc94854df4f87d48a800291172211f3
    • Opcode Fuzzy Hash: f62f06324d02b773c6e34212ff886f3ffc0e0fc6ae11a8594068b945bbad2b02
    • Instruction Fuzzy Hash: 20318030300220DBCF20DF59F988A5A77F9BB92305F90046AE4029B211D738EE85CBAD
    APIs
    • GetFileInformationByHandle.KERNEL32(00000000,?), ref: 004233C8
    • CloseHandle.KERNEL32(00000000), ref: 004233D3
    • CloseHandle.KERNEL32(00000000), ref: 004233E5
    • GetFileInformationByHandle.KERNEL32(00000000,?), ref: 00423411
    • CloseHandle.KERNEL32(00000000), ref: 0042341C
    • CloseHandle.KERNEL32(00000000), ref: 00423420
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Handle$Close$FileInformation
    • String ID:
    • API String ID: 2084189531-0
    • Opcode ID: d484912e99cb8c66730c485e435860303722414c74d627794c241e93365fe73f
    • Instruction ID: 1aaf1e24dcb7efe84bf624300739504c91def5e7e997f4d15dc4eb6941f933df
    • Opcode Fuzzy Hash: d484912e99cb8c66730c485e435860303722414c74d627794c241e93365fe73f
    • Instruction Fuzzy Hash: 9611DB31700128E7DB10DF95FC45F9E77B8AB41311F910152F901EB194DBBCEB4186A9
    APIs
    • __CxxThrowException@8.LIBCMT ref: 0040B1A4
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8RaiseThrow
    • String ID: 0GD$@@$invalid map/set<T> iterator$vA@
    • API String ID: 3976011213-837081462
    • Opcode ID: 7b7bedf3d034100610b77fbaf6e5a71b7f5f74520af66ac9f2efc5d8a685af34
    • Instruction ID: 42e2fd45e14d52ad75f4b14b5571c91fd35f3f04d8e982606b6d4e3943e44748
    • Opcode Fuzzy Hash: 7b7bedf3d034100610b77fbaf6e5a71b7f5f74520af66ac9f2efc5d8a685af34
    • Instruction Fuzzy Hash: 41D1A170A046849FDB11DF64C080B6ABBA1FF55304F6881AED8456F792C339EC86CBD9
    APIs
    • GetStdHandle.KERNEL32(000000F5), ref: 004237C0
    • WaitForSingleObject.KERNEL32(000000FF), ref: 004237E0
    • EnterCriticalSection.KERNEL32(00457AA4), ref: 004237E7
    • LeaveCriticalSection.KERNEL32(00457AA4,00000000), ref: 00423801
    • WriteFile.KERNEL32(?,?,?,00000000), ref: 00423825
    • WriteFile.KERNEL32(00449CA4,00000001,?,00000000), ref: 0042383C
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalFileSectionWrite$EnterHandleLeaveObjectSingleWait
    • String ID:
    • API String ID: 1665657257-0
    • Opcode ID: 70006828fa002023adc9663fa3cac9c830c1046808398677bfe6eb02ddc7df11
    • Instruction ID: c5e775d9a81559d828baf0778ade2b87517e23c5f18d35a6ad0ec28a8ffa8dfa
    • Opcode Fuzzy Hash: 70006828fa002023adc9663fa3cac9c830c1046808398677bfe6eb02ddc7df11
    • Instruction Fuzzy Hash: F51182B5804218AFDB01EFA4EC85EEE7BB8FF45305B50413AF411721A1D7799E44CB68
    APIs
    • __EH_prolog3.LIBCMT ref: 0042B302
      • Part of subcall function 0040AA00: __CxxThrowException@8.LIBCMT ref: 0040AA6D
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    • CreateThread.KERNEL32(00000000,00000000,0042A64E,00000000,00000000,00000000), ref: 0042B642
    • CloseHandle.KERNEL32(00000000), ref: 0042B649
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseCreateException@8H_prolog3HandleThreadThrowchar_traits
    • String ID: IMAGE$STATIC
    • API String ID: 2759594001-2604499632
    • Opcode ID: 8ea4d6ca0730c8c5d2c75ed0dc239637a79de546c6e0b8fbde128e7b9e80dbc7
    • Instruction ID: 273c8f871883c1ffd5c736ad4ee45186a8885ea9cc3bd8deae73063dfa61d6dd
    • Opcode Fuzzy Hash: 8ea4d6ca0730c8c5d2c75ed0dc239637a79de546c6e0b8fbde128e7b9e80dbc7
    • Instruction Fuzzy Hash: FAA1C370B00224ABCF04EF659951ABE37AAAF45308B44406FF905BB3D2CB7C9D51CB99
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00429E02
    • ILCreateFromPath.SHELL32(?), ref: 00429E3D
    • ILCreateFromPath.SHELL32(00000000), ref: 00429E50
    • SHOpenFolderAndSelectItems.SHELL32(00000000,00000001,?,00000000), ref: 00429E5E
    • ILFree.SHELL32(00000000), ref: 00429E6D
    • ILFree.SHELL32(?), ref: 00429E72
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateFreeFromPath$FolderH_prolog3_ItemsOpenSelect
    • String ID:
    • API String ID: 1876049870-0
    • Opcode ID: 6d514105c9c28b4a853b3bfc54a5fdbbbfaedf3c5f24d6aef2319209ef577373
    • Instruction ID: 6cfbc217f819dfe4b45686791afd9addd2468e763639b8d6c18cc5c09b1475e9
    • Opcode Fuzzy Hash: 6d514105c9c28b4a853b3bfc54a5fdbbbfaedf3c5f24d6aef2319209ef577373
    • Instruction Fuzzy Hash: 5501AD72E00124ABCF10A7B5EC45BAE7AB4AF45720F550126F100B72D0CB78AC418BA9
    APIs
    • __CreateFrameInfo.LIBCMT ref: 00413BA9
      • Part of subcall function 004125D8: __getptd.LIBCMT ref: 004125E6
      • Part of subcall function 004125D8: __getptd.LIBCMT ref: 004125F4
    • __getptd.LIBCMT ref: 00413BB3
      • Part of subcall function 0041507C: __getptd_noexit.LIBCMT ref: 0041507F
      • Part of subcall function 0041507C: __amsg_exit.LIBCMT ref: 0041508C
    • __getptd.LIBCMT ref: 00413BC1
    • __getptd.LIBCMT ref: 00413BCF
    • __getptd.LIBCMT ref: 00413BDA
    • _CallCatchBlock2.LIBCMT ref: 00413C00
      • Part of subcall function 0041267D: __CallSettingFrame@12.LIBCMT ref: 004126C9
      • Part of subcall function 00413CA7: __getptd.LIBCMT ref: 00413CB6
      • Part of subcall function 00413CA7: __getptd.LIBCMT ref: 00413CC4
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
    • String ID:
    • API String ID: 1602911419-0
    • Opcode ID: dae30f5ed0dbb6fcde6fcfcb962a81357f7044e4e1c73fa55173d05fbf4ce565
    • Instruction ID: 3a3b829b0dfa3db68fc5949faf2e28c5805cfe67d1568e3c9abb9a7863e23b2f
    • Opcode Fuzzy Hash: dae30f5ed0dbb6fcde6fcfcb962a81357f7044e4e1c73fa55173d05fbf4ce565
    • Instruction Fuzzy Hash: 3C110771C00209EFDB00EFA5C546AEDBBB0FF48319F10806AF854A7251DB799A919F98
    APIs
    • _swscanf.LIBCMT ref: 0040DF4F
    • _swscanf.LIBCMT ref: 0040DF8F
      • Part of subcall function 00401820: char_traits.LIBCPMT ref: 00401878
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: _swscanf$char_traits
    • String ID: %lf$' is not a number.$Unable to parse token length
    • API String ID: 1429961252-2790277816
    • Opcode ID: bffac76f3d59450d7b68950614dbc3a5fe5efa74c0019a4c26a84911f60c34b7
    • Instruction ID: e2ccc3ea299ffc997e11aa6cd8b2993e37f0c395781a76153f7b8af4da744336
    • Opcode Fuzzy Hash: bffac76f3d59450d7b68950614dbc3a5fe5efa74c0019a4c26a84911f60c34b7
    • Instruction Fuzzy Hash: 6571B1B1D002489FDB10DFE5D981ADEFBB8AF44304F10857EE409BB285D7786A49CB54
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00439413
      • Part of subcall function 0042425D: __EH_prolog3_GS.LIBCMT ref: 00424264
      • Part of subcall function 0042425D: AssocQueryStringW.SHLWAPI(00000000,00000002,?,open,00000000,?), ref: 004242AF
    • AssocQueryStringW.SHLWAPI(00000000,00000004,00000001,open,00000000,?), ref: 0043949F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AssocH_prolog3_QueryString
    • String ID: P6[wPO[w$open
    • API String ID: 4091812397-3062883049
    • Opcode ID: a01f625231ddec3b4512241f86440a41d1a5d85960c2963bba5b2392cbe9154d
    • Instruction ID: d032e99a6088a1a02ba2d9b19af0aa846b862b8890f4b744c66d1f4f06dfd0d8
    • Opcode Fuzzy Hash: a01f625231ddec3b4512241f86440a41d1a5d85960c2963bba5b2392cbe9154d
    • Instruction Fuzzy Hash: EA419071D00148EEDF10EBA5CC41ADEBBB4AF49704F10802FF115BB291D6B85E86CB69
    APIs
    • __EH_prolog3.LIBCMT ref: 0040763A
    • std::bad_exception::bad_exception.LIBCMT ref: 0040766C
    • __CxxThrowException@8.LIBCMT ref: 0040767A
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    • std::bad_exception::bad_exception.LIBCMT ref: 0040771D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: std::bad_exception::bad_exception$ExceptionException@8H_prolog3RaiseThrow
    • String ID: deque<T> too long
    • API String ID: 2138009833-309773918
    • Opcode ID: befa1693a3cc2e3d9fca1ab189886dc96402aea32bd03fabb68e0c8b0cdc2358
    • Instruction ID: d64bdba2e7191ce0a0492fd8280bfbfea301ffe7162a6212e6420ec16004147f
    • Opcode Fuzzy Hash: befa1693a3cc2e3d9fca1ab189886dc96402aea32bd03fabb68e0c8b0cdc2358
    • Instruction Fuzzy Hash: 6041D431F142064BDB18EF74E8919AE73A5AB84355B20453FE016F72D2EE79F905874C
    APIs
    • __EH_prolog3.LIBCMT ref: 0042AF46
      • Part of subcall function 00424C75: __EH_prolog3.LIBCMT ref: 00424C7C
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 00403C48: __EH_prolog3.LIBCMT ref: 00403C4F
      • Part of subcall function 0042AEF9: __EH_prolog3.LIBCMT ref: 0042AF00
      • Part of subcall function 0042AEF9: MessageBoxW.USER32(00000000,00449E60,00449A58,00000010), ref: 0042AF17
      • Part of subcall function 0042AEF9: ExitProcess.KERNEL32 ref: 0042AF38
    • __EH_prolog3.LIBCMT ref: 0042AFB5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$ExitMessageProcess
    • String ID: at 0x$exception #0x$exception product #0x
    • API String ID: 864195752-1590855480
    • Opcode ID: 847e560d89950c48f19b13ac732148a1183be1684ac371d83efb64b951d29b0b
    • Instruction ID: d349a130f5cf6efac17657e5b76d3106da8d90abcdbc249021c1838a19962230
    • Opcode Fuzzy Hash: 847e560d89950c48f19b13ac732148a1183be1684ac371d83efb64b951d29b0b
    • Instruction Fuzzy Hash: 1321B57290414CBFEB00EB95C80BBDE7BBC9F15308F24406EF449B7182DA796B4497A6
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __calloc_crt
    • String ID: @QE$PSE$PE
    • API String ID: 3494438863-1231418410
    • Opcode ID: fc9a26dd291835332caed6d4710fad62f8b0ace5d8a4c5d7b06643c271d4e0e3
    • Instruction ID: f25a63fb144e308bb057c5b1c28d18bec4ff2a2c9ea8c720e296ed17a7dae2c2
    • Opcode Fuzzy Hash: fc9a26dd291835332caed6d4710fad62f8b0ace5d8a4c5d7b06643c271d4e0e3
    • Instruction Fuzzy Hash: 39119431309A1197E7248F2DAC507E62381EB84729B64422FF605DA3F1EB38D8C3924C
    APIs
    • LoadLibraryW.KERNEL32(kernel32.dll), ref: 0042315D
    • GetProcAddress.KERNEL32(00000000,IsWow64Process), ref: 0042316D
    • GetCurrentProcess.KERNEL32(?), ref: 00423180
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AddressCurrentLibraryLoadProcProcess
    • String ID: IsWow64Process$kernel32.dll
    • API String ID: 353374858-3024904723
    • Opcode ID: 73de74fa010cbc681ba528b31037d50c12bc113bcd53c5172cbb66a2bcab5c0a
    • Instruction ID: c5671458b1754ca64eaf96e7c13ce7661937e62bfa1152c629f0d7930b6ee01b
    • Opcode Fuzzy Hash: 73de74fa010cbc681ba528b31037d50c12bc113bcd53c5172cbb66a2bcab5c0a
    • Instruction Fuzzy Hash: 6EF0DA64608355AADB138BB6FE0C7663BA86701B0AF4440B6A941922A6DA7CC654C77C
    APIs
    • __getptd.LIBCMT ref: 004138EA
      • Part of subcall function 0041507C: __getptd_noexit.LIBCMT ref: 0041507F
      • Part of subcall function 0041507C: __amsg_exit.LIBCMT ref: 0041508C
    • __getptd.LIBCMT ref: 004138FB
    • __getptd.LIBCMT ref: 00413909
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: MOC$csm
    • API String ID: 803148776-1389381023
    • Opcode ID: 265c42553eb0240ea898c57b48988016ddabf00f8bd868e4847a54b1a75392e0
    • Instruction ID: 18e93fd334ff6758956b677e528d108ad32da7af9b9e5847ed64331dae73f971
    • Opcode Fuzzy Hash: 265c42553eb0240ea898c57b48988016ddabf00f8bd868e4847a54b1a75392e0
    • Instruction Fuzzy Hash: A0E01A31120604DFCB10ABA9C046BE937A8BB8D319F1A00A6A548C7322D77CDEC0958A
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00425345
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004253EB
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0042540C
    • __allrem.LIBCMT ref: 0042541B
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00425431
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$H_prolog3___allrem
    • String ID:
    • API String ID: 107759809-0
    • Opcode ID: 3e817ae35f91ac8c6b860a7706b54718395cbb2face470a426a6b88e95c313d9
    • Instruction ID: 5f23d74009167d310c6846a9c70487cd95401c28822fac240f8d40b7e23ce461
    • Opcode Fuzzy Hash: 3e817ae35f91ac8c6b860a7706b54718395cbb2face470a426a6b88e95c313d9
    • Instruction Fuzzy Hash: 0D517DB1E00258AFDF00DFAAE8859DEBBB5FF44319F50842BF914A6251C7B88955CF48
    APIs
    • EnterCriticalSection.KERNEL32 ref: 0042B66F
    • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 0042B6E0
    • LeaveCriticalSection.KERNEL32(00457A84), ref: 0042B730
    • MessageBoxW.USER32(00449D60,00449CC8,00000024), ref: 0042B758
    • DestroyWindow.USER32 ref: 0042B76E
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalMessageSection$DestroyEnterLeaveSendWindow
    • String ID:
    • API String ID: 581560771-0
    • Opcode ID: b5f2c44658108aaf79d6597a5bfe9eea0e7945b9345dadf514e29ff23ed24dc2
    • Instruction ID: 53d149bb2932181bc76626ae48f1751a4f992d1dd65d0d443cbcda858eb90e04
    • Opcode Fuzzy Hash: b5f2c44658108aaf79d6597a5bfe9eea0e7945b9345dadf514e29ff23ed24dc2
    • Instruction Fuzzy Hash: 003190316483119BD710EF21ED46B4B7BE0EF85709F50082EF985632A2CB78AD45CB9B
    APIs
    • CreateThread.KERNEL32(00000000,00000000,Function_00022C29,00000000,00000000,00000000), ref: 00423259
    • CloseHandle.KERNEL32(00000000), ref: 00423267
    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 00423274
    • GetExitCodeThread.KERNEL32(00000000,?), ref: 00423282
    • CloseHandle.KERNEL32(00000000), ref: 00423289
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseHandleThread$CodeCreateExitObjectSingleWait
    • String ID:
    • API String ID: 4022936218-0
    • Opcode ID: 63c63f714d8cc9471f917328b222a4e9f6d58895bac130d7f07eb2b88a25fc2f
    • Instruction ID: 6494cfe2d9d537ea8efcf4e454e0493a762deb4ef32d6c94974ac2674d506e79
    • Opcode Fuzzy Hash: 63c63f714d8cc9471f917328b222a4e9f6d58895bac130d7f07eb2b88a25fc2f
    • Instruction Fuzzy Hash: D211297A501224FFDB209F65AC4DCAB77BCEA46395310417AF402D3150DB789E458BB5
    APIs
    • GetNamedSecurityInfoW.ADVAPI32(?,00000001,00000001,?,00000000,00000000,00000000,?), ref: 004232C6
    • GetLengthSid.ADVAPI32(?,?,?,?,00000001,00000001,?,00000000,00000000,00000000,?), ref: 004232D9
    • CopySid.ADVAPI32(00000000,00000000,?,?,?,?,00000001,00000001,?,00000000,00000000,00000000,?), ref: 004232EF
    • LocalFree.KERNEL32(?,?,?,?,00000001,00000001,?,00000000,00000000,00000000,?), ref: 004232FC
    • LocalFree.KERNEL32(?,?,?,?,00000001,00000001,?,00000000,00000000,00000000,?), ref: 0042330D
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FreeLocal$CopyInfoLengthNamedSecurity
    • String ID:
    • API String ID: 2716119510-0
    • Opcode ID: 7ef5f90be3e212e9feb24df122f05a23a5d6bfd10f61f84ea8bb989af9959e68
    • Instruction ID: 2e34b4f653d33eaa867f22ab2ec4aceabe87e25795db9d4479b57639c323ec36
    • Opcode Fuzzy Hash: 7ef5f90be3e212e9feb24df122f05a23a5d6bfd10f61f84ea8bb989af9959e68
    • Instruction Fuzzy Hash: 7001B976714110FFDB189FA1ED09EAF7A79DB81706B10416EF502D2150EA74DF40D678
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseHandle$__aulldiv
    • String ID:
    • API String ID: 3821018545-0
    • Opcode ID: 9d5563a1266ac02ea5484df537ebfb9f933b10e44cf8e2f5e1acc34509809c11
    • Instruction ID: 649576c46cd5477df217c65821f9922fabff492e179169527d59eecc04666f35
    • Opcode Fuzzy Hash: 9d5563a1266ac02ea5484df537ebfb9f933b10e44cf8e2f5e1acc34509809c11
    • Instruction Fuzzy Hash: 3A1182B1E00218EBDF14ABE1EC82BAD7778BF48384F15012AF511B7291C6B8AC51CB5D
    APIs
    • SetProcessShutdownParameters.KERNEL32(?,00000001), ref: 00425D06
    • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000), ref: 00425D19
    • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000), ref: 00425D26
    • CreateThread.KERNEL32(00000000,00000000,004254D1,00000000,00000000,00000000), ref: 00425D47
    • CloseHandle.KERNEL32(00000000), ref: 00425D58
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Create$Event$CloseHandleParametersProcessShutdownThread
    • String ID:
    • API String ID: 2273671094-0
    • Opcode ID: 670c20bd93a877338eafb23a82b23ac2f4ee12c6ef6bbe727d1a9434b4180f29
    • Instruction ID: a2f0a1300e5ee6f6e1c51f08aa7d603b9f2799b8354623e6def3d6e44f958931
    • Opcode Fuzzy Hash: 670c20bd93a877338eafb23a82b23ac2f4ee12c6ef6bbe727d1a9434b4180f29
    • Instruction Fuzzy Hash: 5AF0EC35556324BBCB205BA6AC4DEC77FADEB8A7A1B104072F50C86151C6B19581CBA4
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00428DF0
      • Part of subcall function 0040AA00: __CxxThrowException@8.LIBCMT ref: 0040AA6D
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Exception@8H_prolog3_Throwchar_traits
    • String ID: command$name$type
    • API String ID: 2440691708-3438439908
    • Opcode ID: f548fb1b8cc5b31627c20974d5d3cec9f01ce20533ea74914ee5b2e816c8e5f2
    • Instruction ID: 96bd81c36be532cfe1a2be10324c7758634b66bdad093782b62581a822fc4f99
    • Opcode Fuzzy Hash: f548fb1b8cc5b31627c20974d5d3cec9f01ce20533ea74914ee5b2e816c8e5f2
    • Instruction Fuzzy Hash: DFB1E370A002689EDF10EB25DC41BEEB778AF52308F5441EEE54A772D1CB781E85CB69
    APIs
    • __EH_prolog3.LIBCMT ref: 00407D9A
    • std::bad_exception::bad_exception.LIBCMT ref: 00407DC0
    • __CxxThrowException@8.LIBCMT ref: 00407DCE
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    • invalid map/set<T> iterator, xrefs: 00407DA8
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: invalid map/set<T> iterator
    • API String ID: 3715482749-152884079
    • Opcode ID: 184a4c580bc95bd4d25b7083490171944894c3158fe581ecf234c0144678c2cd
    • Instruction ID: 7779c8677bd1fd32596bcf7e96e045f90fd81b43fd5ae6e492f7226d03fc9b74
    • Opcode Fuzzy Hash: 184a4c580bc95bd4d25b7083490171944894c3158fe581ecf234c0144678c2cd
    • Instruction Fuzzy Hash: 23A140B09082819FDB15CF24C144B557BA1AF19318F1885EED4895F3D2C779FC86CB9A
    APIs
    • __EH_prolog3.LIBCMT ref: 00403484
    • std::bad_exception::bad_exception.LIBCMT ref: 004034AA
    • __CxxThrowException@8.LIBCMT ref: 004034B8
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    • invalid map/set<T> iterator, xrefs: 00403492
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: invalid map/set<T> iterator
    • API String ID: 3715482749-152884079
    • Opcode ID: 7c18d5d4013d99806d4b0a65395efaddbd3a891359de8f2c9a88428aa82dcc16
    • Instruction ID: a8bfe9d6e5b53a345aba3f3fb771b499c553e174582fddd3d5438b598f7458d4
    • Opcode Fuzzy Hash: 7c18d5d4013d99806d4b0a65395efaddbd3a891359de8f2c9a88428aa82dcc16
    • Instruction Fuzzy Hash: 57A1A1B0504280AFD721CF25C580755BFE5AB19309F2885AED4895F3E2C37AE986CF59
    APIs
    • __EH_prolog3.LIBCMT ref: 0040379B
    • std::bad_exception::bad_exception.LIBCMT ref: 004037C1
    • __CxxThrowException@8.LIBCMT ref: 004037CF
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    • invalid map/set<T> iterator, xrefs: 004037A9
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: invalid map/set<T> iterator
    • API String ID: 3715482749-152884079
    • Opcode ID: ff7c8201a0a3897ebacb246438d327a093f4ef030574f121d0fcaa8569a99da6
    • Instruction ID: 1cd89a8a4b610f3de899a8e08ff6471e87b7f7b727e7267f2869fb2fb3fd5611
    • Opcode Fuzzy Hash: ff7c8201a0a3897ebacb246438d327a093f4ef030574f121d0fcaa8569a99da6
    • Instruction Fuzzy Hash: 7DA1BE706042809FDB21DF14C184B65BFE5AF15309F1880EEE5896F392D3BAED86CB85
    APIs
    • __EH_prolog3.LIBCMT ref: 004093C0
    • std::bad_exception::bad_exception.LIBCMT ref: 004093E6
    • __CxxThrowException@8.LIBCMT ref: 004093F4
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    • invalid map/set<T> iterator, xrefs: 004093CE
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: invalid map/set<T> iterator
    • API String ID: 3715482749-152884079
    • Opcode ID: 791f02f1378ac69aba3d7642e871640fb31a6aa098a51275b674bce4d2bb6282
    • Instruction ID: c54bba6955d94d1b2b639d96088a2a20ab2ac2e627b0da61a9902bb31361a461
    • Opcode Fuzzy Hash: 791f02f1378ac69aba3d7642e871640fb31a6aa098a51275b674bce4d2bb6282
    • Instruction Fuzzy Hash: F3A18370509281AFDB1ACF14C144B667FA1AF55308F2880AED4855F3D3C77AED86CB96
    APIs
    • __EH_prolog3.LIBCMT ref: 00409063
    • std::bad_exception::bad_exception.LIBCMT ref: 00409089
    • __CxxThrowException@8.LIBCMT ref: 00409097
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    • invalid map/set<T> iterator, xrefs: 00409071
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: invalid map/set<T> iterator
    • API String ID: 3715482749-152884079
    • Opcode ID: 56af8353a16e4dc01ba1dcc63191f1e11c1d3336b9f257e4ae504dd82a06593e
    • Instruction ID: 484545f1e6b8f7b6b393576b822a186ba28221c8416bf2c5577c359f152dd2e2
    • Opcode Fuzzy Hash: 56af8353a16e4dc01ba1dcc63191f1e11c1d3336b9f257e4ae504dd82a06593e
    • Instruction Fuzzy Hash: 4F9180706082819FEB15CF24D188B667FA16B51308F2884EED4855F3D3C77AED86C7A6
    APIs
    • __CxxThrowException@8.LIBCMT ref: 0040BB02
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8RaiseThrow
    • String ID: 0GD$map/set<T> too long$vA@
    • API String ID: 3976011213-3205554264
    • Opcode ID: 81674a34f8400bfe8d53fcb3fa69b1ec7c2c218f4012f7f0d9b0129fbead4c34
    • Instruction ID: 44e191cd355b1d6712e8c815fce3b968e0d1af5fe9ba3181d35140068a8afbc0
    • Opcode Fuzzy Hash: 81674a34f8400bfe8d53fcb3fa69b1ec7c2c218f4012f7f0d9b0129fbead4c34
    • Instruction Fuzzy Hash: B98134B09042469FC714DF18C180956FBB1FF59304B28C2AED859AB796D739EC82CBD8
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00429EE9
    • GetTickCount.KERNEL32 ref: 00429EFE
      • Part of subcall function 004028E7: std::_String_base::_Xlen.LIBCPMT ref: 00402920
    • PostMessageW.USER32(00000402,?,00000000,00000001), ref: 0042A105
      • Part of subcall function 00422891: SetWindowTextW.USER32(?,?), ref: 004228A5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CountH_prolog3_MessagePostString_base::_TextTickWindowXlenstd::_
    • String ID: % -
    • API String ID: 3571351700-2510404823
    • Opcode ID: 15faf9c159cfe9f8b591e73d450f321cc6f1350a514c37fea0dc514f9fe8317a
    • Instruction ID: f8c1bcfd9c6be6a4beb287e46141c8d71d480bc51ec5a42aaacf6f3435dd69e7
    • Opcode Fuzzy Hash: 15faf9c159cfe9f8b591e73d450f321cc6f1350a514c37fea0dc514f9fe8317a
    • Instruction Fuzzy Hash: 5461C7B1D05258FFEB00EBA5ED46BCD7B7CAB04305F10417AF605B71A2CA785E448B69
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ___free_lc_time___free_lconv_mon___free_lconv_num
    • String ID: TSE
    • API String ID: 1156122516-64283894
    • Opcode ID: 917b7b0f8a4b5ed4c0b32e494302f74a9eae6470214d3f0634c842df6012d6eb
    • Instruction ID: cb06fb2e2100732cca35d74974b99fb3f0f5f6426e5cb9b358c298795f7e5e47
    • Opcode Fuzzy Hash: 917b7b0f8a4b5ed4c0b32e494302f74a9eae6470214d3f0634c842df6012d6eb
    • Instruction Fuzzy Hash: 09319E712047019BDB30AB69DA85AE777A6EF40314F14492FF614E7221CB7CACE08A5D
    APIs
    • __EH_prolog3.LIBCMT ref: 00402C79
    • std::bad_exception::bad_exception.LIBCMT ref: 00402CA1
    • __CxxThrowException@8.LIBCMT ref: 00402CAF
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: map/set<T> too long
    • API String ID: 3715482749-1285458680
    • Opcode ID: 66b5440c4bf92ee1b234a56bf6e5a9df24462e34bdb05e24c2da6337965fb119
    • Instruction ID: c81d3db658e9e453b40083b55ec6ba1027f1ec409163a514d1e75f43dd340e9b
    • Opcode Fuzzy Hash: 66b5440c4bf92ee1b234a56bf6e5a9df24462e34bdb05e24c2da6337965fb119
    • Instruction Fuzzy Hash: BA414C702006409FD311CF29C288A59BBE1BF59304F1585AEE4496B7E2C7B9EC45CF98
    APIs
    • __EH_prolog3.LIBCMT ref: 00408E69
    • std::bad_exception::bad_exception.LIBCMT ref: 00408E8F
    • __CxxThrowException@8.LIBCMT ref: 00408E9D
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: map/set<T> too long
    • API String ID: 3715482749-1285458680
    • Opcode ID: 22a955b3a42cc49131789c3319dc681e66160eaa358c426eb2872537a0822977
    • Instruction ID: e6a03e21a4a1bb93c73a446f8fd87beed2c01f0cdce6678eb7d90223a49b8012
    • Opcode Fuzzy Hash: 22a955b3a42cc49131789c3319dc681e66160eaa358c426eb2872537a0822977
    • Instruction Fuzzy Hash: 58414970600245DFC705DF15C284A56BBB1BF15308F1980AEE885AB792CB7AED81CB95
    APIs
    • __EH_prolog3.LIBCMT ref: 00407999
    • std::bad_exception::bad_exception.LIBCMT ref: 004079C1
    • __CxxThrowException@8.LIBCMT ref: 004079CF
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: map/set<T> too long
    • API String ID: 3715482749-1285458680
    • Opcode ID: d344a747c3e8fb480567f6b3bcb95b62188cbe9040dbcd8a0b133a1784f8342f
    • Instruction ID: 1e68a7bedbe1080ba4c8f960abdfdba04c0512f3c3c0ed3d40f5c04ec0cc0f12
    • Opcode Fuzzy Hash: d344a747c3e8fb480567f6b3bcb95b62188cbe9040dbcd8a0b133a1784f8342f
    • Instruction Fuzzy Hash: 5F419CB06042409FD310CF29C184A5ABBF1BF59304F1585AED4495B7A2CB79FD85CF99
    APIs
    • __EH_prolog3.LIBCMT ref: 00402F65
    • std::bad_exception::bad_exception.LIBCMT ref: 00402F8D
    • __CxxThrowException@8.LIBCMT ref: 00402F9B
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: map/set<T> too long
    • API String ID: 3715482749-1285458680
    • Opcode ID: e2dd501d9aa75fe84021119255099a7b9921b3ee6ee05eea08892c4cd6ba77fa
    • Instruction ID: 919a1875158cb2201affd69b6c425493ebcfa631cda03999997d06b30c323c09
    • Opcode Fuzzy Hash: e2dd501d9aa75fe84021119255099a7b9921b3ee6ee05eea08892c4cd6ba77fa
    • Instruction Fuzzy Hash: DF416D702002419FC721DF19C284E5ABFF5BF19304F1981AAE449AB3A2C77AFD85CB94
    APIs
    • __EH_prolog3.LIBCMT ref: 00408B11
    • std::bad_exception::bad_exception.LIBCMT ref: 00408B3A
    • __CxxThrowException@8.LIBCMT ref: 00408B48
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: map/set<T> too long
    • API String ID: 3715482749-1285458680
    • Opcode ID: 37fab6679fe49a4160db1611396d7f18d815a6841f9d9c166bd245d7aada0b3d
    • Instruction ID: 6180966414397292128e710a0d43728aed8d35ee1e9914f91f9dc017429c214c
    • Opcode Fuzzy Hash: 37fab6679fe49a4160db1611396d7f18d815a6841f9d9c166bd245d7aada0b3d
    • Instruction Fuzzy Hash: FA412B705042408FD715DF18D684A56BBF0AF55304F5580EEE885AB3A3CB79FD41CBA9
    APIs
    • __EH_prolog3.LIBCMT ref: 0042B208
      • Part of subcall function 0043599A: __EH_prolog3.LIBCMT ref: 004359A1
      • Part of subcall function 0040450F: __EH_prolog3.LIBCMT ref: 00404516
      • Part of subcall function 0042560F: EnterCriticalSection.KERNEL32(00457AA4), ref: 0042561F
      • Part of subcall function 0042560F: LeaveCriticalSection.KERNEL32(00457AA4,?), ref: 00425689
      • Part of subcall function 0042560F: ReleaseSemaphore.KERNEL32(00000001,00000000), ref: 00425699
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
      • Part of subcall function 00403C93: __EH_prolog3.LIBCMT ref: 00403C9A
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 00403C48: __EH_prolog3.LIBCMT ref: 00403C4F
      • Part of subcall function 0042AB7E: __EH_prolog3_GS.LIBCMT ref: 0042AB88
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3$CriticalSection$EnterH_prolog3_LeaveReleaseSemaphorechar_traits
    • String ID: &launch=$/delay?time=$delay time=
    • API String ID: 3186593112-2719618242
    • Opcode ID: a9af3abc7e75fb9e0b85fbb8fc03c27f7f141fc91657d702bca9583e71b5aa17
    • Instruction ID: 8714308669e0181508e0050dc2594495559a3aee36011b9c26e65c815b0a4b75
    • Opcode Fuzzy Hash: a9af3abc7e75fb9e0b85fbb8fc03c27f7f141fc91657d702bca9583e71b5aa17
    • Instruction Fuzzy Hash: 0121B4B2900148BADB10FBA5CC46ECF7B7C9F55309F10416FB60AB7192EA381F058729
    APIs
    • __EH_prolog3.LIBCMT ref: 00424F26
    • CoTaskMemFree.OLE32(?,00457EF8,?,00000020,00427B01,?,00000001,00000000,00000001,00000000), ref: 00424FA7
      • Part of subcall function 00423EDA: SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 00423F4A
    Strings
    • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00424FE4
    • \User Pinned\TaskBar, xrefs: 00424FB9
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FolderFreeH_prolog3PathTask
    • String ID: \Microsoft\Internet Explorer\Quick Launch$\User Pinned\TaskBar
    • API String ID: 647753649-732664054
    • Opcode ID: 6d24ee7f96ab94f22fe4cb5238dbd43b3649ce01e52e39f13fc4d0146047a7ec
    • Instruction ID: 736ca3d16753bda912fd6054a5caa3e85a17e77a2175e144d7f72e33dbcc564e
    • Opcode Fuzzy Hash: 6d24ee7f96ab94f22fe4cb5238dbd43b3649ce01e52e39f13fc4d0146047a7ec
    • Instruction Fuzzy Hash: A721F931B0831499EB00BFA2BD46AAE3670AF4131AF50413FF521A21E2CBBD8A44975D
    APIs
    • GetFileVersionInfoSizeW.VERSION(?,00000000), ref: 0042345A
    • GetFileVersionInfoW.VERSION(?,00000000,?,00000000,?,?,00000000), ref: 0042347F
    • VerQueryValueW.VERSION(00000000,00446970,?,00000000,?,00000000,?,00000000,?,?,00000000), ref: 0042349A
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: FileInfoVersion$QuerySizeValue
    • String ID: 4
    • API String ID: 2179348866-4088798008
    • Opcode ID: 0c5ba90ea324d42d21541c68f798855e70a42e98ff4e17d70419c7656e7f2e8d
    • Instruction ID: 086146fe2248e95e1f02d756e09c090bcdd0f4c29a11ca9f8f89814d909abaa3
    • Opcode Fuzzy Hash: 0c5ba90ea324d42d21541c68f798855e70a42e98ff4e17d70419c7656e7f2e8d
    • Instruction Fuzzy Hash: D501A971B00214BADB21BEA5AD41B9B73BC9F00755F500597F401E7141E6BCEA85C7B8
    APIs
    • ___BuildCatchObject.LIBCMT ref: 00413F41
      • Part of subcall function 00413E9C: ___BuildCatchObjectHelper.LIBCMT ref: 00413ED2
    • _UnwindNestedFrames.LIBCMT ref: 00413F58
    • ___FrameUnwindToState.LIBCMT ref: 00413F66
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: BuildCatchObjectUnwind$FrameFramesHelperNestedState
    • String ID: csm
    • API String ID: 2163707966-1018135373
    • Opcode ID: 1017d1925290206c102a1b4b14bee173987c8610bdb2a29022d20a6a9d2a745e
    • Instruction ID: 22d06c462d937801c4c891afab4cd35a1c53e9eff8ec467b89849f972895c6d3
    • Opcode Fuzzy Hash: 1017d1925290206c102a1b4b14bee173987c8610bdb2a29022d20a6a9d2a745e
    • Instruction Fuzzy Hash: CB012831400109BBDF126E52CC49EEB7F6AEF04359F004016FD1855121D77ADAB2DBA8
    APIs
    • GetModuleHandleA.KERNEL32(KERNEL32,0041454A), ref: 0041B35F
    • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 0041B36F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AddressHandleModuleProc
    • String ID: IsProcessorFeaturePresent$KERNEL32
    • API String ID: 1646373207-3105848591
    • Opcode ID: ca4a4aa48aa54b88de227b08e757c6c5720bbc4caaf8081c5b9c0bfa9e81082a
    • Instruction ID: 9ace4527e08476e381b24a6ee32f04ea33101610494f5af8d0e66459dc08fff1
    • Opcode Fuzzy Hash: ca4a4aa48aa54b88de227b08e757c6c5720bbc4caaf8081c5b9c0bfa9e81082a
    • Instruction Fuzzy Hash: F4F03030A00A0DD3DF001BE1BD4E7AF7A79FB81701F920591D592B00C5DF3480B1D29A
    APIs
    • GetLastError.KERNEL32 ref: 00422D37
    • Sleep.KERNEL32(00000064), ref: 00422D54
    • CreateFileW.KERNEL32(?,?,?,00000000,?,?,00000000), ref: 00422D6D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateErrorFileLastSleep
    • String ID: d
    • API String ID: 408151869-2564639436
    • Opcode ID: 84350466b7d808052e12ed85cd7ec8061862e959321b940b84d877abfa8b8e30
    • Instruction ID: 53e1cddba847d4bc6109e581123eac59b253c3c2417de718e10348f447958b3f
    • Opcode Fuzzy Hash: 84350466b7d808052e12ed85cd7ec8061862e959321b940b84d877abfa8b8e30
    • Instruction Fuzzy Hash: FFF05932610628BBCF214F94ED08B8D3B25BB0B330F600642F511911F0C3F989909B4A
    APIs
    • __EH_prolog3.LIBCMT ref: 0042A4D2
      • Part of subcall function 0042560F: EnterCriticalSection.KERNEL32(00457AA4), ref: 0042561F
      • Part of subcall function 0042560F: LeaveCriticalSection.KERNEL32(00457AA4,?), ref: 00425689
      • Part of subcall function 0042560F: ReleaseSemaphore.KERNEL32(00000001,00000000), ref: 00425699
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    • PostMessageW.USER32(00000010,00000000,00000000,00000001), ref: 0042A50A
    • Sleep.KERNEL32(00001388), ref: 0042A515
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CriticalSection$EnterH_prolog3LeaveMessagePostReleaseSemaphoreSleepchar_traits
    • String ID: shutdown
    • API String ID: 135377891-2510479042
    • Opcode ID: b7ce464cd602f15415fd93a18c2af3c8f0bfed927ba53bf0d5a5eaaa4398e987
    • Instruction ID: 32136ce85528b2e3d784d4b1780335c78ccd3cce79bfb8a6427f12149fff906a
    • Opcode Fuzzy Hash: b7ce464cd602f15415fd93a18c2af3c8f0bfed927ba53bf0d5a5eaaa4398e987
    • Instruction Fuzzy Hash: EDE0ED32681308AAE700BBE2DD47FCC7664AB58B19F90542AB201BA0E2DAF95584961C
    APIs
    • __EH_prolog3.LIBCMT ref: 00410C7D
    • std::bad_exception::bad_exception.LIBCMT ref: 00410C9A
    • __CxxThrowException@8.LIBCMT ref: 00410CA8
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    Strings
    • invalid string position, xrefs: 00410C82
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8H_prolog3RaiseThrowstd::bad_exception::bad_exception
    • String ID: invalid string position
    • API String ID: 3715482749-1799206989
    • Opcode ID: 4168c7e5fc2e44562bd1b812ff0f4f3241b6b9d4ab0c053e0c29892d77bb5c4d
    • Instruction ID: f421038905a6a7f4268d817e255f731584bc29c66ad6b651f323bdcc626ea2b0
    • Opcode Fuzzy Hash: 4168c7e5fc2e44562bd1b812ff0f4f3241b6b9d4ab0c053e0c29892d77bb5c4d
    • Instruction Fuzzy Hash: 70D017B295010CA7DB04F6D2C982FDD7338AB54718F10442BB201B64C2EBBC6688C62C
    APIs
    • __EH_prolog3.LIBCMT ref: 00425124
    • __alldvrm.LIBCMT ref: 00425150
    • __alldvrm.LIBCMT ref: 00425161
    • __alldvrm.LIBCMT ref: 00425172
      • Part of subcall function 004239D1: __alldvrm.LIBCMT ref: 004239F3
      • Part of subcall function 00403C02: __EH_prolog3.LIBCMT ref: 00403C09
      • Part of subcall function 004028E7: std::_String_base::_Xlen.LIBCPMT ref: 00402920
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __alldvrm$H_prolog3$String_base::_Xlenstd::_
    • String ID:
    • API String ID: 4156925505-0
    • Opcode ID: 348168381f24d36baefad7cd82668dded2a55b871f283deb4504168d09f644a4
    • Instruction ID: 67367ec20441bef9e1115ca34384c6ff284c7ffdfc9b9877dd34ca9880769844
    • Opcode Fuzzy Hash: 348168381f24d36baefad7cd82668dded2a55b871f283deb4504168d09f644a4
    • Instruction Fuzzy Hash: 306150B1D00659EADF10EFD5DD829DEBBB8AF08314F60416FF610B3292C6785E448B69
    APIs
    • _memmove_s.LIBCMT ref: 0040F2A9
    • _memmove_s.LIBCMT ref: 0040F2DA
      • Part of subcall function 00410200: __CxxThrowException@8.LIBCMT ref: 00410289
    • _memmove_s.LIBCMT ref: 0040F318
    • _memmove_s.LIBCMT ref: 0040F342
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: _memmove_s$Exception@8Throw
    • String ID:
    • API String ID: 2992690706-0
    • Opcode ID: ae084066d7801d4f71f9142f44ef53186c07d50232a72a2bb5ec2b9814c92941
    • Instruction ID: a47f2da452b4b0d45736c2f16d12db6a40534c6698f50f03188f304e8965ba83
    • Opcode Fuzzy Hash: ae084066d7801d4f71f9142f44ef53186c07d50232a72a2bb5ec2b9814c92941
    • Instruction Fuzzy Hash: 8A419F71E001059BDB18DF68DC91ABF77B5EB80300F1805BEEC15A7345E639EE158798
    APIs
    • _memmove_s.LIBCMT ref: 0040F41B
    • _memmove_s.LIBCMT ref: 0040F44C
      • Part of subcall function 00410200: __CxxThrowException@8.LIBCMT ref: 00410289
    • _memmove_s.LIBCMT ref: 0040F48A
    • _memmove_s.LIBCMT ref: 0040F4B4
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: _memmove_s$Exception@8Throw
    • String ID:
    • API String ID: 2992690706-0
    • Opcode ID: b0793147b639263a1be474d9d4c9ed7991728636ad991472b06ea6b70036ea40
    • Instruction ID: 7fe11bf752918773269d14dd8cbdf0330f72627a1759ebba3d193157fff64eea
    • Opcode Fuzzy Hash: b0793147b639263a1be474d9d4c9ed7991728636ad991472b06ea6b70036ea40
    • Instruction Fuzzy Hash: B841AF71E002059BDB28DF68C891ABF73B5EB90300F044A7EED15A7385E678EE14CB94
    APIs
    • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0041F375
    • __isleadbyte_l.LIBCMT ref: 0041F3A9
    • MultiByteToWideChar.KERNEL32(00000080,00000009,00417EC0,?,00000000,00000000,?,?,?,?,00417EC0,00000000,?), ref: 0041F3DA
    • MultiByteToWideChar.KERNEL32(00000080,00000009,00417EC0,00000001,00000000,00000000,?,?,?,?,00417EC0,00000000,?), ref: 0041F448
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
    • String ID:
    • API String ID: 3058430110-0
    • Opcode ID: 3db43ec4385791b0d80f00dc709922dff0d7eb9c511754cb056a075c4db2dd5d
    • Instruction ID: f07aff31a9a4a47af0765d8ca4da7b1855cfcd43cc856976444468292dfea948
    • Opcode Fuzzy Hash: 3db43ec4385791b0d80f00dc709922dff0d7eb9c511754cb056a075c4db2dd5d
    • Instruction Fuzzy Hash: F431C031A04259EFCB20DF64C880AEF7BA5BF01321F18457AE8658B291D334DEC6DB59
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 00437CE2
    • WaitForSingleObject.KERNEL32(00000000,000000FF,000000A4,0043210A), ref: 00437CFE
    • CloseHandle.KERNEL32(?), ref: 00437D06
      • Part of subcall function 00423A5B: CharLowerW.USER32(00000000), ref: 00423AB0
      • Part of subcall function 00426FD8: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00427036
    • Sleep.KERNEL32(00001388,00000001,00000000,00000001,00000000), ref: 00437DE7
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharCloseCreateH_prolog3_HandleLowerObjectSingleSleepSnapshotToolhelp32Wait
    • String ID:
    • API String ID: 4054888592-0
    • Opcode ID: a487ae1e29f44e04c12e79219ce5772dc8a9e5f7138b0988972a1b9e39390ac9
    • Instruction ID: 06ec0f4510304afe2df128076dec5f305a2d328849e2f2ba13c7950163399b4a
    • Opcode Fuzzy Hash: a487ae1e29f44e04c12e79219ce5772dc8a9e5f7138b0988972a1b9e39390ac9
    • Instruction Fuzzy Hash: E9419335D04219DBDF10EBA1DD427DDB774AF04308F1040AAE649B7292CB782E85CF59
    APIs
    • std::bad_exception::bad_exception.LIBCMT ref: 00401644
    • __CxxThrowException@8.LIBCMT ref: 00401652
    • __EH_prolog3_catch.LIBCMT ref: 0040165F
    • char_traits.LIBCPMT ref: 004016FA
      • Part of subcall function 00410FD3: _malloc.LIBCMT ref: 00410FED
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Exception@8H_prolog3_catchThrow_mallocchar_traitsstd::bad_exception::bad_exception
    • String ID:
    • API String ID: 1578287386-0
    • Opcode ID: a6516bc6bf96564a9d36ba33a453a2c5d210bed60cd50db9cbc9f114e3e4c60d
    • Instruction ID: a45f1639fd93f54a04312005fd3759d52eef518fd81d71c07d440c5f7791aced
    • Opcode Fuzzy Hash: a6516bc6bf96564a9d36ba33a453a2c5d210bed60cd50db9cbc9f114e3e4c60d
    • Instruction Fuzzy Hash: F711E771A00204BBDB04AB958842B9DB3A9BB44314F14853FF926B75D1DBBAEA50878D
    APIs
    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00000000,00000000,00020106,00000000,?,00000000), ref: 004236A7
    • lstrlenW.KERNEL32(?,?,00000000,00000000,00000000,00020106,00000000,?,00000000), ref: 004236B9
    • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,?,00000002,?,00000000,00000000,00000000,00020106,00000000,?,00000000), ref: 004236DC
    • RegCloseKey.ADVAPI32(?,?,00000000,00000000,00000000,00020106,00000000,?,00000000), ref: 004236E9
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CloseCreateValuelstrlen
    • String ID:
    • API String ID: 1356686001-0
    • Opcode ID: b30ed5d0df35f720ad9fc89921eb91a4a1cebfaaadc5d5723fb4bac2633d3dd5
    • Instruction ID: 3cd77d9b5eb6881ecad91980499289b63bd7a12892a1d14b7b589648a2fb278b
    • Opcode Fuzzy Hash: b30ed5d0df35f720ad9fc89921eb91a4a1cebfaaadc5d5723fb4bac2633d3dd5
    • Instruction Fuzzy Hash: C501B174204218FFDB208F50EC89EA777BDFB013467504029F10296260D779EF14EA68
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
    • Instruction ID: 0621c41d723495d0d27681da8aa887efaafaa75cb424d2a7eebf5ab3d428d66f
    • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
    • Instruction Fuzzy Hash: 3411803204014EBBCF125E85DC05CEE3F26FF19355B18855AFE1858131D33AC9B5AB85
    APIs
    • IsDialogMessageW.USER32(?,?), ref: 00422851
    • TranslateMessage.USER32(?), ref: 0042285F
    • DispatchMessageW.USER32(?), ref: 00422869
    • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00422876
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Message$DialogDispatchTranslate
    • String ID:
    • API String ID: 3514118866-0
    • Opcode ID: 0a313478c5e86c62293e51e347fa9eb9c95d0a7b48623a2f52e6f87587fd611f
    • Instruction ID: e5cbeca6de5e79d8ee9a2bd6157bb3e8df46cbb451d3fee49b21c034be76bfef
    • Opcode Fuzzy Hash: 0a313478c5e86c62293e51e347fa9eb9c95d0a7b48623a2f52e6f87587fd611f
    • Instruction Fuzzy Hash: AAF0F636B04519B78B00BFE5BD49DABB7BCBAD67003404136F501D3011E668D4068B78
    APIs
    • BeginPaint.USER32(?,?), ref: 00429B86
    • GetSysColorBrush.USER32(0000000F), ref: 00429B90
    • DrawIconEx.USER32(?,00000000,00000000,00000000,00000000), ref: 00429BC0
    • EndPaint.USER32(?,?), ref: 00429BCB
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Paint$BeginBrushColorDrawIcon
    • String ID:
    • API String ID: 2285589323-0
    • Opcode ID: 8c8f7fcd1d2252c5c6bd5c8743971f99ea96f5eddb5e56eec3441359489c894e
    • Instruction ID: bc56cb05c79b63b011f1bd7ad89916b5bdfa5e2565d87f9d2312d5bf636005c8
    • Opcode Fuzzy Hash: 8c8f7fcd1d2252c5c6bd5c8743971f99ea96f5eddb5e56eec3441359489c894e
    • Instruction Fuzzy Hash: 07013135600209BFEB01AFA0ED06FAE7B6CFF05705F910035F901950A1DAE4AE419B6C
    APIs
    • _malloc.LIBCMT ref: 00410FED
      • Part of subcall function 0041159B: __FF_MSGBANNER.LIBCMT ref: 004115BE
      • Part of subcall function 0041159B: __NMSG_WRITE.LIBCMT ref: 004115C5
      • Part of subcall function 0041159B: HeapAlloc.KERNEL32(00000000,-0000000F,00000001,00000000,00000000,?,00413676,00000000,00000001,00000000,?,004158C7,00000018,0044D2A8,0000000C,00415958), ref: 00411612
    • std::bad_alloc::bad_alloc.LIBCMT ref: 00411010
      • Part of subcall function 00410FB8: std::exception::exception.LIBCMT ref: 00410FC4
    • std::bad_exception::bad_exception.LIBCMT ref: 00411024
    • __CxxThrowException@8.LIBCMT ref: 00411032
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AllocException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
    • String ID:
    • API String ID: 3622535130-0
    • Opcode ID: 4437c7b0b8eff3acb08e0fced23751d5c7f9890abfee5871e85ca763a3fe707b
    • Instruction ID: 222d8d9efd024288686ec8270555546e0d7cd60b842afc2bdb16ef98efd7f7fb
    • Opcode Fuzzy Hash: 4437c7b0b8eff3acb08e0fced23751d5c7f9890abfee5871e85ca763a3fe707b
    • Instruction Fuzzy Hash: 80F0E231A0420966DF14B721EC03EED3B645B4075DB21403BFC01964E2EEECDACA814C
    APIs
    • __getptd.LIBCMT ref: 00412BB9
      • Part of subcall function 0041507C: __getptd_noexit.LIBCMT ref: 0041507F
      • Part of subcall function 0041507C: __amsg_exit.LIBCMT ref: 0041508C
    • __getptd.LIBCMT ref: 00412BD0
    • __amsg_exit.LIBCMT ref: 00412BDE
    • __lock.LIBCMT ref: 00412BEE
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __amsg_exit__getptd$__getptd_noexit__lock
    • String ID:
    • API String ID: 3521780317-0
    • Opcode ID: 659cbb970a542e52a38874b3136d09b649c7968a6051bd179fd8b6d0552e2bdd
    • Instruction ID: 9be1fa5523277f5f8634092f9ca3c349e99115718d25a180e0b875165d400f2a
    • Opcode Fuzzy Hash: 659cbb970a542e52a38874b3136d09b649c7968a6051bd179fd8b6d0552e2bdd
    • Instruction Fuzzy Hash: 8BF06D31A04B00DBD760BFA69A037DD73A0AB44729F10411FE550DB2D2CBBCA9D18B9E
    APIs
    • InitializeCriticalSection.KERNEL32(00457AA4,?,00425619), ref: 004238DE
    • CreateSemaphoreW.KERNEL32(00000000,00000000,00000400,00000000,?,00425619), ref: 004238EC
    • CreateThread.KERNEL32(00000000,00000000,Function_0002379B,00000000,00000000,00000000), ref: 00423901
    • CloseHandle.KERNEL32(00000000,?,00425619), ref: 00423908
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Create$CloseCriticalHandleInitializeSectionSemaphoreThread
    • String ID:
    • API String ID: 4124923094-0
    • Opcode ID: 762eeeb0e2684ae292b46d33173239d84753ee2bcca6a7cc53c071972cc07cd5
    • Instruction ID: 81c970d8e8bb1f6cc6841748ae2ce6df8539f7fd31522c9dcf740251defa5409
    • Opcode Fuzzy Hash: 762eeeb0e2684ae292b46d33173239d84753ee2bcca6a7cc53c071972cc07cd5
    • Instruction Fuzzy Hash: 96E01A75546230BBC6215BA5BC0CFCB3E6CEF4B7A3B110136B51591061CBB84681C7EC
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __fileno__getbuf
    • String ID: HWE
    • API String ID: 2304796792-1921285094
    • Opcode ID: c9c5efb2e299aaaa4ead719114217179a93cb289d9bcb133eee6878c857515e2
    • Instruction ID: 15a553fb6b9a03c43930880872835f9a695bbaf8805efa77afec68214ac8708b
    • Opcode Fuzzy Hash: c9c5efb2e299aaaa4ead719114217179a93cb289d9bcb133eee6878c857515e2
    • Instruction Fuzzy Hash: 9D31E572100A044AC7358A79D8406A737D1AB92334728477BE8BA877D1D73DE8CB861D
    APIs
    • CoTaskMemFree.OLE32(?,00457F18,?), ref: 004250BA
    • SHGetFolderPathW.SHELL32(00000000,00000005,00000000,00000000,?), ref: 004250CE
      • Part of subcall function 004235C6: GetFileAttributesW.KERNEL32(00457F14,004250F7,00457F18,?), ref: 004235D5
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: AttributesFileFolderFreePathTask
    • String ID: \Downloads
    • API String ID: 261851141-1864973320
    • Opcode ID: a7f2b807e1d9f09bb53eb938fbe727ea3aedb13d2cdfee29d4aa79811b1ce012
    • Instruction ID: 5aa536f6aed99c08f93496cc440dacc4f7d3d554b188984fa61d818ac85dbe75
    • Opcode Fuzzy Hash: a7f2b807e1d9f09bb53eb938fbe727ea3aedb13d2cdfee29d4aa79811b1ce012
    • Instruction Fuzzy Hash: 6621F871A04328AAEB10FF65BD45B7E77B8AF41709F4040BFF604A2192DB7C8944975C
    APIs
    Strings
    • in Json::Value::duplicateStringValue(): Failed to allocate string value buffer, xrefs: 004098EF
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Exception@8Throw_malloc
    • String ID: in Json::Value::duplicateStringValue(): Failed to allocate string value buffer
    • API String ID: 3476970888-3522564335
    • Opcode ID: 33b16aa890f24b1cc070d9ef67e8bd3ecf577d643e2e755e67a63706b2bee2d6
    • Instruction ID: d8f305cca4d7728b87c8228cc328e3351109718ccfa62e297e2e00781f496c37
    • Opcode Fuzzy Hash: 33b16aa890f24b1cc070d9ef67e8bd3ecf577d643e2e755e67a63706b2bee2d6
    • Instruction Fuzzy Hash: FF11EB73D00608ABC701DFA88C41BEEB7F8DB45320F14466BE825B73C1EB7999048798
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3
    • String ID: 3e18e0508fd502a51ca0138091b7e80e$hghf659f45
    • API String ID: 431132790-2769677135
    • Opcode ID: b0c21f7634065c18526fab40dab2d4861eb4cb62741ef8918be044a7c2d61b0e
    • Instruction ID: d159747a77e97965966388604d947ac8c3b32930c9fa0b33d657731362c52a1d
    • Opcode Fuzzy Hash: b0c21f7634065c18526fab40dab2d4861eb4cb62741ef8918be044a7c2d61b0e
    • Instruction Fuzzy Hash: 2621C5329042489ADB01EBA6EC82EDD77B4AF5430CF10817FE455771E2DB785A05CB1C
    APIs
    • __EH_prolog3_catch_GS.LIBCMT ref: 00424D77
    Strings
    • SOFTWARE\Microsoft\Windows\CurrentVersion, xrefs: 00424DDD
    • ProgramFilesDir, xrefs: 00424DC6
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3_catch_
    • String ID: ProgramFilesDir$SOFTWARE\Microsoft\Windows\CurrentVersion
    • API String ID: 1329019490-1909746267
    • Opcode ID: 9da1c509904a97c7909f4f00d50cc87264d80f35b42d219e504d5d8b64e974c0
    • Instruction ID: 3540de5a1fb99462d663c441778021bbb8494330bef7b2169a36bba358bc36dc
    • Opcode Fuzzy Hash: 9da1c509904a97c7909f4f00d50cc87264d80f35b42d219e504d5d8b64e974c0
    • Instruction Fuzzy Hash: 0B21F530A04394E9DB00EBA5AC06B8D7B70AB44308F6040BEE904B72E2C7B85E44CB58
    APIs
    • __CxxThrowException@8.LIBCMT ref: 00410289
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    • std::exception::exception.LIBCMT ref: 004102CA
    • __CxxThrowException@8.LIBCMT ref: 004102DF
      • Part of subcall function 00410FD3: _malloc.LIBCMT ref: 00410FED
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: Exception@8Throw$ExceptionRaise_mallocstd::exception::exception
    • String ID: deque<T> too long$vA@
    • API String ID: 465789080-4126863640
    • Opcode ID: f33cbcf66e16c2a25828c68d3fcaf2c4da722b8d0307da1e6ce644ed141d220c
    • Instruction ID: fc59770f523df5e319aab616f4555756d12097ed23453be4461b829e2d949843
    • Opcode Fuzzy Hash: f33cbcf66e16c2a25828c68d3fcaf2c4da722b8d0307da1e6ce644ed141d220c
    • Instruction Fuzzy Hash: 831190B080024CAADB01EFE5DD81BDEBBB8FB04314F50466EE51167681EBB85608CA55
    APIs
    • SetNamedSecurityInfoW.ADVAPI32(?,00000001,00000001,?,00000000,00000000,00000000), ref: 004238A1
    • SetNamedSecurityInfoW.ADVAPI32(?,00000001,00000004,00000000,00000000,00000000,00000000), ref: 004238C6
      • Part of subcall function 00423319: GetCurrentProcess.KERNEL32(00000020,?), ref: 00423328
      • Part of subcall function 00423319: OpenProcessToken.ADVAPI32(00000000), ref: 0042332F
    Strings
    • SeTakeOwnershipPrivilege, xrefs: 0042385C
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: InfoNamedProcessSecurity$CurrentOpenToken
    • String ID: SeTakeOwnershipPrivilege
    • API String ID: 1489085889-3375656754
    • Opcode ID: 66fb1ad463e316866a370cfebf66fc59a1488bdf466a03bd9c02f467a86f0891
    • Instruction ID: 864b075c5d0e34cdf14af7649e880e6e9bf8eb427b33dc2ec0b00c8ad540bcab
    • Opcode Fuzzy Hash: 66fb1ad463e316866a370cfebf66fc59a1488bdf466a03bd9c02f467a86f0891
    • Instruction Fuzzy Hash: C7019670B50214BEFB149B64ED86FA973BDEB05705F40016AF601AB291D7F8AE4487E8
    APIs
    • __EH_prolog3_GS.LIBCMT ref: 0043696B
      • Part of subcall function 00436036: __EH_prolog3.LIBCMT ref: 0043603D
      • Part of subcall function 00423A5B: CharLowerW.USER32(00000000), ref: 00423AB0
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: CharH_prolog3H_prolog3_Lower
    • String ID: Content-Type$text
    • API String ID: 2243128287-210706158
    • Opcode ID: d45c22475398047e322e2295bf1ebd371aadfc2c0b8fd0f815d9454090e79b62
    • Instruction ID: 93206012dcea578c22f6d3166e43fcb743159657086cc934417cc3ccfe99115b
    • Opcode Fuzzy Hash: d45c22475398047e322e2295bf1ebd371aadfc2c0b8fd0f815d9454090e79b62
    • Instruction Fuzzy Hash: 07F0A431E40244A5CB14FA768D57ECF66789F88704F90812EF224BB2D2CABC5A458764
    APIs
      • Part of subcall function 0041262B: __getptd.LIBCMT ref: 00412631
      • Part of subcall function 0041262B: __getptd.LIBCMT ref: 00412641
    • __getptd.LIBCMT ref: 00413CB6
      • Part of subcall function 0041507C: __getptd_noexit.LIBCMT ref: 0041507F
      • Part of subcall function 0041507C: __amsg_exit.LIBCMT ref: 0041508C
    • __getptd.LIBCMT ref: 00413CC4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: __getptd$__amsg_exit__getptd_noexit
    • String ID: csm
    • API String ID: 803148776-1018135373
    • Opcode ID: dad7ce64f9db8df9865c91e171c7ffd249f7b05e35bef5d51d16c9ac305832eb
    • Instruction ID: ecb524e3a6e8e2dd5ec2f19559e9ef451380fa04d6e86325529896a5299930fd
    • Opcode Fuzzy Hash: dad7ce64f9db8df9865c91e171c7ffd249f7b05e35bef5d51d16c9ac305832eb
    • Instruction Fuzzy Hash: 770128358003059BCF34AF65D4406EEBBB5AF14312F24442FE48197292DB39CED0CA59
    APIs
    • __EH_prolog3.LIBCMT ref: 00426806
      • Part of subcall function 004265AA: __EH_prolog3_GS.LIBCMT ref: 004265B4
      • Part of subcall function 0040173A: char_traits.LIBCPMT ref: 0040175F
    Strings
    • 1OtU3OaRC1xO5rErBozbP4G2hNm67mUH, xrefs: 00426820
    • hlPxjHRu9UWCOtTORdZ51F7RYWUCWy73, xrefs: 0042680F
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: H_prolog3H_prolog3_char_traits
    • String ID: 1OtU3OaRC1xO5rErBozbP4G2hNm67mUH$hlPxjHRu9UWCOtTORdZ51F7RYWUCWy73
    • API String ID: 3685356560-3654031149
    • Opcode ID: f8c47f994b8b0e701261e9c6139b01b79945696f217508fa54299c88fb875574
    • Instruction ID: 16ccc66f99b78474b49cfa79b4bae72fac64fe850044e664d0e2dc139a99c324
    • Opcode Fuzzy Hash: f8c47f994b8b0e701261e9c6139b01b79945696f217508fa54299c88fb875574
    • Instruction Fuzzy Hash: 05F03031A40108AAEB00FBA1DD92FDC7774AF14709F50806AF501BA1D2DBF96B8AC758
    APIs
    • InterlockedDecrement.KERNEL32(00000008), ref: 0040106B
    • SysFreeString.OLEAUT32(00000000), ref: 00401080
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: DecrementFreeInterlockedString
    • String ID: `LwLw
    • API String ID: 3298718523-3431591817
    • Opcode ID: 8be9b92f1e793706b24cad95a68e9e8b11b91d79ff362938f030ae69a6946580
    • Instruction ID: 25eceb43c7ef64e8d8626d1cbd83fce6d3d1eae0a7294534f156ff57a9ef5d55
    • Opcode Fuzzy Hash: 8be9b92f1e793706b24cad95a68e9e8b11b91d79ff362938f030ae69a6946580
    • Instruction Fuzzy Hash: BBE09231A11A614BD7309F75E809BA773ACAF00B50B15042BFD80E76A0DB7CDCC0865C
    APIs
    • CoInitializeEx.OLE32(00000000,00000006), ref: 00422C32
    • ShellExecuteW.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 00422C45
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExecuteInitializeShell
    • String ID: open
    • API String ID: 4132032380-2758837156
    • Opcode ID: b0fb4df7280baee9e47ae6117738990c2442dded8765d74958e942715b99032e
    • Instruction ID: 9f25706f014e614f09682f07908b313a76c6fb494b28c1d5c140758ed5bbb107
    • Opcode Fuzzy Hash: b0fb4df7280baee9e47ae6117738990c2442dded8765d74958e942715b99032e
    • Instruction Fuzzy Hash: 9CE08C371552343AE72127E2AC0EFDB7E18EB077B0F008022FA0966090C9A645A0C2E8
    APIs
    • __CxxThrowException@8.LIBCMT ref: 004226B5
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    • SetParent.USER32(?,?), ref: 004226C8
    Strings
    • Can't add child because window not created, xrefs: 004226AE
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8ParentRaiseThrow
    • String ID: Can't add child because window not created
    • API String ID: 3573755502-3609820812
    • Opcode ID: 41fc45c9c2396026ed0096bb1d7629a19afdbb5fee840107ece15b1a4427e377
    • Instruction ID: 3e68ee832d66d77b90622337689a757592fac7eeb3564d1474f0d21e8580a717
    • Opcode Fuzzy Hash: 41fc45c9c2396026ed0096bb1d7629a19afdbb5fee840107ece15b1a4427e377
    • Instruction Fuzzy Hash: F1E04FB4700209BBD710DF95EA85A5B77FDBB9470C324C0A9E409D7201E7B5D9029758
    APIs
    • __CxxThrowException@8.LIBCMT ref: 0042271D
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    • ShowWindow.USER32(?,?), ref: 0042272F
    Strings
    • Can't show window because window not created, xrefs: 00422716
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: ExceptionException@8RaiseShowThrowWindow
    • String ID: Can't show window because window not created
    • API String ID: 4018245886-1727106819
    • Opcode ID: 825a779ae32149502b7cce05e22d4fbd780263d3852b98b6433407f3e144c74e
    • Instruction ID: ce0bf999913aecd15be768acb17c4f5f0ee8748b15b1656f216c50c0607f2635
    • Opcode Fuzzy Hash: 825a779ae32149502b7cce05e22d4fbd780263d3852b98b6433407f3e144c74e
    • Instruction Fuzzy Hash: 43D02BF03102087A9B088FA4D8CAEEA3BECDA14B40741C11EF90DC6001E7F8E5408668
    APIs
    • __CxxThrowException@8.LIBCMT ref: 004226EA
      • Part of subcall function 004122AB: RaiseException.KERNEL32(?,?,00411037,?,?,?,?,?,00411037,?,0044D68C,00456CF8,?,00401373,?), ref: 004122ED
    • EnableWindow.USER32(?,00000000), ref: 004226F9
    Strings
    • Can't disable window because window not created, xrefs: 004226E3
    Memory Dump Source
    • Source File: 00000000.00000002.1539061781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.1539044167.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539103333.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539125304.0000000000455000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1539142138.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
    Similarity
    • API ID: EnableExceptionException@8RaiseThrowWindow
    • String ID: Can't disable window because window not created
    • API String ID: 2161987055-2392149179
    • Opcode ID: 98cae38be1c326f5a8dc78fb8512496407140d83bcafc7f7d42d6892300fd088
    • Instruction ID: 2d8dfacf987e22632f39275ccb3b2134d8b9c119db3ffa555be09886ea7f2adc
    • Opcode Fuzzy Hash: 98cae38be1c326f5a8dc78fb8512496407140d83bcafc7f7d42d6892300fd088
    • Instruction Fuzzy Hash: 11D05BB16003087FD744DF64DD49D9E3F9C9A54740704C05EB40DC6501E7F4E5548769