Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PI No 20000814C.exe

Overview

General Information

Sample name:PI No 20000814C.exe
Analysis ID:1447909
MD5:2c40af3164c197806fcf499a1e6a0b85
SHA1:4bb49ffbbaa20503615a610b579a2c8dacb21fdd
SHA256:e29923d4e3fa5b30614a263828db410b0ab5c452a4237c8ae33a21ffaaf73cc4
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Binary is likely a compiled AutoIt script file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to query CPU information (cpuid)
Detected potential crypto function
Found potential string decryption / allocating functions
One or more processes crash
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • PI No 20000814C.exe (PID: 2336 cmdline: "C:\Users\user\Desktop\PI No 20000814C.exe" MD5: 2C40AF3164C197806FCF499A1E6A0B85)
    • WerFault.exe (PID: 6788 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 532 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: PI No 20000814C.exeReversingLabs: Detection: 83%
Source: PI No 20000814C.exeVirustotal: Detection: 44%Perma Link
Source: PI No 20000814C.exeJoe Sandbox ML: detected
Source: PI No 20000814C.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net

System Summary

barindex
Source: PI No 20000814C.exe, 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_cd5e12e4-c
Source: PI No 20000814C.exe, 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1d421492-2
Source: PI No 20000814C.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_36205f92-4
Source: PI No 20000814C.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_bf092c20-0
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E2E0600_2_00E2E060
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00EA804A0_2_00EA804A
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E341400_2_00E34140
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E424050_2_00E42405
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E565220_2_00E56522
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00EA06650_2_00EA0665
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E5267E0_2_00E5267E
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E368430_2_00E36843
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E4283A0_2_00E4283A
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E2E8000_2_00E2E800
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E589DF0_2_00E589DF
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00EA0AE20_2_00EA0AE2
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E56A940_2_00E56A94
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E7EB070_2_00E7EB07
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E88B130_2_00E88B13
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E4CD610_2_00E4CD61
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E570060_2_00E57006
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E331900_2_00E33190
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E3710E0_2_00E3710E
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E212870_2_00E21287
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E433C70_2_00E433C7
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E4F4190_2_00E4F419
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E416C40_2_00E416C4
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E356800_2_00E35680
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E358C00_2_00E358C0
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E478D30_2_00E478D3
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E4DBB50_2_00E4DBB5
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E41BB80_2_00E41BB8
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E59D050_2_00E59D05
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E2FE400_2_00E2FE40
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E4BFE60_2_00E4BFE6
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E41FD00_2_00E41FD0
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: String function: 00E48B40 appears 42 times
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: String function: 00E29BF8 appears 35 times
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: String function: 00E29A20 appears 34 times
Source: C:\Users\user\Desktop\PI No 20000814C.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 532
Source: PI No 20000814C.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2336
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\1c1557c6-06f6-4845-aeb6-5f246b84e61cJump to behavior
Source: PI No 20000814C.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PI No 20000814C.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PI No 20000814C.exeReversingLabs: Detection: 83%
Source: PI No 20000814C.exeVirustotal: Detection: 44%
Source: unknownProcess created: C:\Users\user\Desktop\PI No 20000814C.exe "C:\Users\user\Desktop\PI No 20000814C.exe"
Source: C:\Users\user\Desktop\PI No 20000814C.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 532
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeSection loaded: wsock32.dllJump to behavior
Source: PI No 20000814C.exeStatic file information: File size 1173504 > 1048576
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E2C588 push eax; retn 0040h0_2_00E2C599
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E48B85 push ecx; ret 0_2_00E48B98
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\PI No 20000814C.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E4800A ___security_init_cookie,LdrInitializeThunk,0_2_00E4800A
Source: PI No 20000814C.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
Source: C:\Users\user\Desktop\PI No 20000814C.exeCode function: 0_2_00E4886B cpuid 0_2_00E4886B
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
2
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
2
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PI No 20000814C.exe83%ReversingLabsWin32.Trojan.ShellcodeCrypter
PI No 20000814C.exe45%VirustotalBrowse
PI No 20000814C.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1447909
Start date and time:2024-05-27 12:18:16 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 2s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:13
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:PI No 20000814C.exe
Detection:MAL
Classification:mal56.winEXE@2/5@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 1
  • Number of non-executed functions: 57
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 13.89.179.12
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
TimeTypeDescription
06:19:42API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8515013932329505
Encrypted:false
SSDEEP:192:QCNNUUGyWyG0BU/QjedqzuiFHZ24IO8W:3NNUlyWytBU/QjhzuiFHY4IO8W
MD5:F3A90B5C66C7EDFB6AA7E4CDF25ABDE9
SHA1:7D6AA22D9DBF1126347E245E08AC2DDB0A1D88F1
SHA-256:5A1544DD7DED2C3698A6A90CE54C0C4A3EE9157D24B233F17FF37CC3DF98BCC7
SHA-512:F9120A9A25B5FF2B86973B1D4717C7C085D71F39EB43BC472C96AA48239ADB438100FB8E5734185A6BC02964DF131D0DFDBF366DAC89A37650C7D0FA60C05470
Malicious:false
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.1.2.7.8.7.7.7.0.1.8.1.0.1.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.1.2.7.8.7.7.7.6.1.1.8.4.7.8.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.6.d.d.e.b.2.9.-.d.f.6.1.-.4.8.d.3.-.b.2.2.1.-.d.1.8.d.1.e.0.3.f.e.7.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.7.f.a.7.1.2.0.-.f.8.c.f.-.4.d.7.9.-.b.e.d.6.-.0.d.a.7.8.c.a.c.7.0.5.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.P.I. .N.o. .2.0.0.0.0.8.1.4.C...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.2.0.-.0.0.0.1.-.0.0.1.4.-.d.a.d.5.-.0.c.6.0.1.f.b.0.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.4.2.7.e.c.d.d.a.6.0.f.9.8.f.3.e.1.f.c.b.4.1.0.f.1.2.f.4.8.f.3.0.0.0.0.0.9.0.8.!.0.0.0.0.4.b.b.4.9.f.f.b.b.a.a.2.0.5.0.3.6.1.5.a.6.1.0.b.5.7.9.a.2.c.8.d.a.c.b.2.1.f.d.d.!.P.I. .N.o. .2.0.0.0.0.8.1.4.C...e.x.e...
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 14 streams, Mon May 27 10:19:37 2024, 0x1205a4 type
Category:dropped
Size (bytes):42812
Entropy (8bit):1.8432475282672873
Encrypted:false
SSDEEP:192:HimdI88COOYUjHqqm7/7nccbYITGkvvS:Cmd/8CJPHq97jccbYITR
MD5:060B7BD08336F805AD6BDD02E9C837E5
SHA1:E1FBD133638557B6EC98C968B3554921A7B32FFB
SHA-256:4862DC013417ED351738BCD3BD1DFAC0A6A87821B29EAA604B65AF9BBFD78DA0
SHA-512:DEB7451D60872666A455EBD34A6256B1FF3E45CB1C14F890EE5E865384F0BAD91F81CD2DF4165F83B3A7A44EDB41F7D83D571B57E607401613AB4BC6AEF3BCC3
Malicious:false
Reputation:low
Preview:MDMP..a..... .......9^Tf........................\...............l'..........T.......8...........T...........P..........................................................................................................eJ......|.......GenuineIntel............T....... ...8^Tf.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8326
Entropy (8bit):3.6947909396653387
Encrypted:false
SSDEEP:192:R6l7wVeJZel6R6YSvSU9kte1gmfEpCprq89bDSsfbtBm:R6lXJ86R6YaSU9kmgmfEp0DRfbi
MD5:AC3935353B6735432F5F84B922DA40A2
SHA1:BA1F4E2E6773BED81BF383BDAF15BCAA192D0D4A
SHA-256:2F319EE01FFE977128002CE42BFCFF449ED6BF63BE2C5D61DC910A4B720E791E
SHA-512:3EDB74AFFF235080AC6EC50865DAE48AF9F43B9A35ABB94185780A510A9223C34229982269FD7E7819625B0DA61B2D4370439C31F836E98AA32CF794C86DE441
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.3.3.6.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4614
Entropy (8bit):4.4541264696171705
Encrypted:false
SSDEEP:48:cvIwWl8zstJg77aI9adWpW8VYGYm8M4JwYmFa+q8UTpXLAad:uIjfHI7cs7VqJwSlpXLAad
MD5:82315993FCC354665C6BC83CFF579D31
SHA1:B5B4461D95BF8E8AFC88F8AC72422CFB870DFEC3
SHA-256:3C6E3A07D9C3299E8F49370E766E189E189D034E3DE209E0D5703FBD8349630E
SHA-512:5C0CC86A41CD1229AEA360FEA0D0E37FD319861B82AEAB646D410624CD1EC49C696297A8F080F0552FC2E6B52B3B78CB5A7A3446898130EFC2B00756DBD82E73
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="341362" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.372140455986441
Encrypted:false
SSDEEP:6144:YFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNkiLK:gV1QyWWI/glMM6kF72qK
MD5:FCBC04893C838357C177EA96D64182A4
SHA1:8335089D95FD2629BB3C84DA9421BF7A42CA2218
SHA-256:95953EE3BFF041FB075CF95A31ED3612288913D945FC08A90DDDF3337169CA56
SHA-512:F689BDAD48E59BB74B34F1574047404371629C7C14D317A5E2EBED63230FF765900D4ACC6D07671D301168A8017162444D1D6B9C7F7BCCFF8F3699B7DEEEE489
Malicious:false
Reputation:low
Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmV.m`.................................................................................................................................................................................................................................................................................................................................................E{T........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):6.975374924293833
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.70%
  • Win32 EXE Yoda's Crypter (26571/9) 0.26%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:PI No 20000814C.exe
File size:1'173'504 bytes
MD5:2c40af3164c197806fcf499a1e6a0b85
SHA1:4bb49ffbbaa20503615a610b579a2c8dacb21fdd
SHA256:e29923d4e3fa5b30614a263828db410b0ab5c452a4237c8ae33a21ffaaf73cc4
SHA512:2d4446f612390f59cc8464468033052f0c17d1abe0cd0527eb550509b70de60d8c343b1abb7981b9bee9864b53ea90606afdd578371ce42677f9a7ffb1c4dfc1
SSDEEP:24576:GAHnh+eWsN3skA4RV1Hom2KXcmtcFv/wgbv6okJQNC:hh+ZkldoPKsacFnwAv7
TLSH:DB45BE0273D6C036FFAB92739F6AE20156B97D254133852F13982D79BD701B2273E662
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
Icon Hash:aaf3e3e3938382a0
Entrypoint:0x42800a
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
Time Stamp:0x664EA1CE [Thu May 23 01:54:22 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:bd3825b6e0410966f0c31f64b6c7644a
Instruction
call 00007F7620FA599Dh
jmp 00007F7620F98754h
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
int3
push edi
push esi
mov esi, dword ptr [esp+10h]
mov ecx, dword ptr [esp+14h]
mov edi, dword ptr [esp+0Ch]
mov eax, ecx
mov edx, ecx
add eax, esi
cmp edi, esi
jbe 00007F7620F988DAh
cmp edi, eax
jc 00007F7620F98C3Eh
bt dword ptr [004C41FCh], 01h
jnc 00007F7620F988D9h
rep movsb
jmp 00007F7620F98BECh
cmp ecx, 00000080h
jc 00007F7620F98AA4h
mov eax, edi
xor eax, esi
test eax, 0000000Fh
jne 00007F7620F988E0h
bt dword ptr [004BF324h], 01h
jc 00007F7620F98DB0h
bt dword ptr [004C41FCh], 00000000h
jnc 00007F7620F98A7Dh
test edi, 00000003h
jne 00007F7620F98A8Eh
test esi, 00000003h
jne 00007F7620F98A6Dh
bt edi, 02h
jnc 00007F7620F988DFh
mov eax, dword ptr [esi]
sub ecx, 04h
lea esi, dword ptr [esi+04h]
mov dword ptr [edi], eax
lea edi, dword ptr [edi+04h]
bt edi, 03h
jnc 00007F7620F988E3h
movq xmm1, qword ptr [esi]
sub ecx, 08h
lea esi, dword ptr [esi+08h]
movq qword ptr [edi], xmm1
lea edi, dword ptr [edi+08h]
test esi, 00000007h
je 00007F7620F98935h
bt esi, 03h
Programming Language:
  • [ASM] VS2013 build 21005
  • [ C ] VS2013 build 21005
  • [C++] VS2013 build 21005
  • [ C ] VS2008 SP1 build 30729
  • [IMP] VS2008 SP1 build 30729
  • [ASM] VS2013 UPD5 build 40629
  • [RES] VS2013 build 21005
  • [LNK] VS2013 UPD5 build 40629
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x541f8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x8f0000x2fd8e0x2fe00cffa6f225a55a507d8464581bdbb27d5False0.3176709366840731data5.680734504290733IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xc80000x541f80x542003c16cc1a414aca2de77f0c9cb0ebbe97False0.9223973811292719data7.880587929666203IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x11d0000x71340x72008a46a4bc77a3f321996ff4079f834054False0.0017475328947368421data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
RT_RCDATA0xd07b80x4b490data1.0003275307424895
RT_GROUP_ICON0x11bc480x76dataEnglishGreat Britain0.6610169491525424
RT_GROUP_ICON0x11bcc00x14dataEnglishGreat Britain1.25
RT_GROUP_ICON0x11bcd40x14dataEnglishGreat Britain1.15
RT_GROUP_ICON0x11bce80x14dataEnglishGreat Britain1.25
RT_VERSION0x11bcfc0x10cdataEnglishGreat Britain0.6007462686567164
RT_MANIFEST0x11be080x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
DLLImport
KERNEL32.DLLDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
PSAPI.DLLGetProcessMemoryInfo
SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
UxTheme.dllIsThemeActive
VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
Language of compilation systemCountry where language is spokenMap
EnglishGreat Britain
TimestampSource PortDest PortSource IPDest IP
May 27, 2024 12:19:57.762661934 CEST53566791.1.1.1192.168.2.8

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:06:19:36
Start date:27/05/2024
Path:C:\Users\user\Desktop\PI No 20000814C.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\PI No 20000814C.exe"
Imagebase:0xe20000
File size:1'173'504 bytes
MD5 hash:2C40AF3164C197806FCF499A1E6A0B85
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:06:19:36
Start date:27/05/2024
Path:C:\Windows\SysWOW64\WerFault.exe
Wow64 process (32bit):true
Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 532
Imagebase:0xbb0000
File size:483'680 bytes
MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:0%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:66.7%
    Total number of Nodes:3
    Total number of Limit Nodes:0
    execution_graph 118949 e4800a 118952 e550d7 118949->118952 118953 e4800f LdrInitializeThunk 118952->118953

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 e4800a-e4800f call e550d7 LdrInitializeThunk
    APIs
    • ___security_init_cookie.LIBCMT ref: 00E4800A
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: ___security_init_cookie
    • String ID:
    • API String ID: 3657697845-0
    • Opcode ID: 26db91e6245672e8584d34beee5bc1048c98b81b04b6a077b02f066b5f7b6865
    • Instruction ID: 9ce5e3893aa71920788c6ff98fb0763e9fa94a15f359bc71ca6bf9cba9b59e87
    • Opcode Fuzzy Hash: 26db91e6245672e8584d34beee5bc1048c98b81b04b6a077b02f066b5f7b6865
    • Instruction Fuzzy Hash:
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memmove$_memset
    • String ID: $"$'$)$+-p $-p $0$0wK$9$<$@$R$n$o$p$q$s${
    • API String ID: 1357608183-613261138
    • Opcode ID: ce09b7ae3f1f3eb577794364a1e258ca6c0e99c45195fa8c790f52c04ac44792
    • Instruction ID: 4542dea9bbe5b476cf5e70e6c814bc8ca6db7d9ce5785e2240a2b3564e844fba
    • Opcode Fuzzy Hash: ce09b7ae3f1f3eb577794364a1e258ca6c0e99c45195fa8c790f52c04ac44792
    • Instruction Fuzzy Hash: 6B93A171A00215DFDB24CFA8C885BEDB7B1FF48314F25916AE959BB290E7709E81DB40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
    • API String ID: 0-1546025612
    • Opcode ID: 6000303c6950a329683c880c1145399cc16b7f655a195cb1113640f1e615aa68
    • Instruction ID: bdfb59f6bcab5eee8ed52f64d5e6d85d2b3ccba18087f04ad499df87fbb87dca
    • Opcode Fuzzy Hash: 6000303c6950a329683c880c1145399cc16b7f655a195cb1113640f1e615aa68
    • Instruction Fuzzy Hash: DEA28EB0E0421ACBDF24CF58D9447EDBBB1FB55358F14A5AAD855B7280D770AE81CB40

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2705 e358c0-e358d2 2706 e35b8a-e35b8c 2705->2706 2707 e358d8-e358dc 2705->2707 2709 e35b75-e35b7b 2706->2709 2707->2706 2708 e358e2-e358fc call e27e8c 2707->2708 2712 e35902-e3591c call e277c7 * 2 2708->2712 2713 e358fe 2708->2713 2718 e35920-e35924 2712->2718 2713->2712 2719 e708c4-e708c8 2718->2719 2720 e3592a-e3592e 2718->2720 2721 e35b47-e35b72 call e279ab call e27c8e call e25a64 * 2 2719->2721 2722 e708ce 2719->2722 2720->2721 2723 e35934-e35938 2720->2723 2721->2709 2726 e708d3-e708d9 2722->2726 2723->2721 2724 e3593e-e35941 2723->2724 2724->2721 2727 e35947-e3594c 2724->2727 2730 e708e3 2726->2730 2731 e708db 2726->2731 2727->2721 2732 e35952-e35978 call e34140 2727->2732 2737 e708ef-e70906 call e35604 2730->2737 2731->2730 2738 e35b38-e35b3b 2732->2738 2739 e3597e-e35996 2732->2739 2750 e7090d-e7093a call e28189 call e28170 call e40ff6 2737->2750 2738->2721 2745 e35b3d-e35b41 2738->2745 2739->2726 2742 e3599c-e359a1 2739->2742 2742->2721 2746 e359a7-e359b1 2742->2746 2745->2721 2745->2737 2748 e35ae1-e35af0 call e27e8c 2746->2748 2749 e359b7-e359bc 2746->2749 2758 e35a19-e35a1e 2748->2758 2749->2748 2751 e359c2-e359c5 2749->2751 2764 e70942-e7095e call e78123 call e281a7 call e25a64 2750->2764 2755 e35b81-e35b83 2751->2755 2756 e359cb-e359cf 2751->2756 2755->2706 2759 e359d5-e359dd 2756->2759 2760 e35b7e 2756->2760 2758->2764 2765 e35a24-e35a26 2758->2765 2759->2750 2762 e359e3-e359e9 2759->2762 2760->2755 2767 e35af5-e35b03 call e28170 2762->2767 2768 e359ef-e35a16 call e41080 2762->2768 2772 e70963-e709af call e28189 call e28170 call e40ff6 call e41080 2764->2772 2770 e35a6b-e35a81 call e35680 2765->2770 2771 e35a28-e35a30 2765->2771 2790 e35b05-e35b0b call e4106c 2767->2790 2791 e35b0e-e35b30 call e40ff6 2767->2791 2768->2758 2792 e35a87-e35a8c 2770->2792 2793 e70ad8-e70af4 call e78123 call e281a7 call e25a64 2770->2793 2771->2772 2773 e35a36-e35a3f 2771->2773 2779 e709b7-e709bc 2772->2779 2773->2779 2780 e35a45-e35a67 call e41080 2773->2780 2786 e709c5-e709ca 2779->2786 2787 e709be-e709c0 2779->2787 2780->2770 2797 e70a05-e70a0a 2786->2797 2798 e709cc-e709d4 2786->2798 2795 e70a7f-e70aad call e28170 call e40fa5 2787->2795 2790->2791 2791->2738 2802 e35ad1-e35adc 2792->2802 2803 e35a8e-e35a96 2792->2803 2814 e70af9-e70b45 call e28189 call e28170 call e40ff6 call e41080 2793->2814 2848 e70ad1 2795->2848 2849 e70aaf-e70ace call e41080 call e430b0 2795->2849 2811 e70a45-e70a4d 2797->2811 2812 e70a0c-e70a14 2797->2812 2807 e709d6 2798->2807 2808 e709dc-e70a03 2798->2808 2802->2718 2803->2814 2815 e35a9c-e35aa5 2803->2815 2807->2808 2820 e70a7c 2808->2820 2825 e70a55-e70a79 2811->2825 2826 e70a4f 2811->2826 2821 e70a16 2812->2821 2822 e70a1c-e70a43 2812->2822 2824 e70b4d-e70b52 2814->2824 2823 e35aab-e35acd call e41080 2815->2823 2815->2824 2820->2795 2821->2822 2822->2820 2823->2802 2834 e70b54-e70b56 2824->2834 2835 e70b5b-e70b60 2824->2835 2825->2820 2826->2825 2843 e70c12-e70c40 call e28170 call e40fa5 2834->2843 2837 e70b62-e70b6a 2835->2837 2838 e70b9b-e70ba0 2835->2838 2844 e70b72-e70b99 2837->2844 2845 e70b6c 2837->2845 2846 e70ba2-e70baa 2838->2846 2847 e70bdb-e70be3 2838->2847 2868 e70c64 2843->2868 2869 e70c42-e70c61 call e41080 call e430b0 2843->2869 2844->2843 2845->2844 2854 e70bb2-e70bd9 2846->2854 2855 e70bac 2846->2855 2857 e70be5 2847->2857 2858 e70beb-e70c0f 2847->2858 2848->2793 2849->2848 2854->2843 2855->2854 2857->2858 2858->2843 2869->2868
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memmove
    • String ID:
    • API String ID: 4104443479-0
    • Opcode ID: 8c54e5318c7b82e50e4f6995c3842c099c5acce867169d86dc37b7ebc633337e
    • Instruction ID: ea2c8053b210c2c4aacdce8d52816cd0e85bc5582829e3226813f5f30be065e6
    • Opcode Fuzzy Hash: 8c54e5318c7b82e50e4f6995c3842c099c5acce867169d86dc37b7ebc633337e
    • Instruction Fuzzy Hash: 83129971A00609EBDF14CFA4D985AEEB7F5FF48300F109669E44AB7291EB35AE11CB50

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2875 e35680-e356d1 call e40ff6 * 2 2880 e356d7-e356f3 2875->2880 2881 e3588a-e3588c 2875->2881 2882 e704f0-e7051f call e28189 call e40fa5 2880->2882 2883 e356f9-e3570b 2880->2883 2887 e35894 2881->2887 2897 e70526-e7052c 2882->2897 2885 e35711-e35723 2883->2885 2886 e357b7-e35800 call e40ff6 * 2 2883->2886 2890 e35726-e3572a 2885->2890 2904 e35806 2886->2904 2905 e358ac-e358b1 2886->2905 2894 e3589c 2887->2894 2890->2887 2893 e35730-e35737 2890->2893 2893->2897 2898 e3573d-e3573f 2893->2898 2903 e358a4 2894->2903 2901 e357a0-e357a5 2897->2901 2902 e70532-e70544 call e27b20 2897->2902 2898->2894 2900 e35745-e3574c 2898->2900 2906 e35752-e3575a 2900->2906 2907 e705b5-e705c9 call e7fa04 2900->2907 2901->2890 2909 e357ab-e357b5 2901->2909 2918 e705ce-e705e5 call e27b20 call e27a84 2902->2918 2919 e7054a-e70556 call e27b20 2902->2919 2903->2905 2910 e3580c-e35817 2904->2910 2905->2910 2906->2903 2911 e35760-e35771 2906->2911 2921 e70580-e7059b call e76731 call e27c8e 2907->2921 2922 e705cb 2907->2922 2909->2886 2914 e358b6-e358b8 2910->2914 2915 e3581d-e35824 2910->2915 2916 e705e7-e7063c call e28189 call e28170 call e40ff6 call e41080 2911->2916 2917 e35777-e35780 2911->2917 2914->2915 2924 e70772-e70774 2915->2924 2925 e3582a 2915->2925 3019 e7075b-e70767 2916->3019 2927 e35786-e3579c 2917->2927 2928 e70641-e70646 2917->2928 2973 e7059e-e705b0 2918->2973 2919->2918 2938 e70558-e7056e call e27b20 call e43e9f 2919->2938 2921->2973 2922->2918 2924->2925 2936 e7077a-e7077d 2924->2936 2934 e3582d-e35832 2925->2934 2927->2901 2930 e70655-e7065a 2928->2930 2931 e70648-e70650 2928->2931 2940 e70693-e7069a 2930->2940 2941 e7065c-e70668 2930->2941 2939 e70707-e70735 call e28170 call e40fa5 2931->2939 2944 e70807-e70823 call e78123 call e281a7 call e25a64 2934->2944 2945 e35838-e3583d 2934->2945 2947 e7077f-e70786 2936->2947 2948 e70788 2936->2948 2938->2973 3004 e70570-e7057b call e7fa04 2938->3004 3007 e70737-e70756 call e41080 call e430b0 2939->3007 3008 e70759 2939->3008 2953 e706d1-e706db 2940->2953 2954 e7069c-e706a6 2940->2954 2950 e70670-e70691 2941->2950 2951 e7066a 2941->2951 3022 e708bc 2944->3022 2956 e35843-e35845 2945->2956 2957 e70828-e70830 2945->2957 2947->2948 2960 e7078b-e70790 2947->2960 2948->2960 2963 e70704 2950->2963 2951->2950 2966 e706e3-e70701 2953->2966 2967 e706dd 2953->2967 2964 e706ae-e706cf 2954->2964 2965 e706a8 2954->2965 2974 e35847-e35858 call e4106c * 2 2956->2974 2975 e3585b-e35860 2956->2975 2971 e70886-e7088e call e27cb3 2957->2971 2972 e70832-e70884 call e28189 call e28170 call e40ff6 call e41080 2957->2972 2977 e707c6-e707d2 call e28087 2960->2977 2978 e70792-e707c4 call e28189 call e28170 call e40ff6 2960->2978 2963->2939 2964->2963 2965->2964 2966->2963 2967->2966 3000 e70893-e708b8 call e41080 2971->3000 2972->3000 2973->2901 2974->2975 2980 e35862 2975->2980 2981 e35867-e35869 2975->2981 3005 e707d5-e70802 call e41080 2977->3005 2978->3005 2980->2981 2991 e3586b-e3587c call e4106c * 2 2981->2991 2992 e3587f-e35887 2981->2992 2991->2992 3000->3022 3004->2921 3005->2934 3007->3008 3008->3019 3019->2924
    APIs
      • Part of subcall function 00E40FF6: std::exception::exception.LIBCMT ref: 00E4102C
      • Part of subcall function 00E40FF6: __CxxThrowException@8.LIBCMT ref: 00E41041
    • _memmove.LIBCMT ref: 00E7062F
    • _memmove.LIBCMT ref: 00E70744
    • _memmove.LIBCMT ref: 00E707EB
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memmove$Exception@8Throwstd::exception::exception
    • String ID: yZ
    • API String ID: 1300846289-3798167742
    • Opcode ID: 631f9aed64d9a7fd7f6562c39e6dd328e799f8293935057f32a6335396fa8f9c
    • Instruction ID: fa3989bb4d1ba0251ae0e7e291cff45d9de383d9f300e6b0579ea41d2c9c0417
    • Opcode Fuzzy Hash: 631f9aed64d9a7fd7f6562c39e6dd328e799f8293935057f32a6335396fa8f9c
    • Instruction Fuzzy Hash: E5029271E00205DBDF08DF64E9856AE7BF5EF44300F159069E80AEB395EB31D954CB91
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID: prL
    • API String ID: 0-3386091405
    • Opcode ID: 80962cfc756a024321c3b92fb81d030722e5def25ace007b9e52334b09d3a1b4
    • Instruction ID: b850428f7c9be1bcd5b95aa7f7bf360bd88eab7cd211af51ef9334213e010fe1
    • Opcode Fuzzy Hash: 80962cfc756a024321c3b92fb81d030722e5def25ace007b9e52334b09d3a1b4
    • Instruction Fuzzy Hash: 2B928BB06083418FD724DF14D494B6ABBE1BF84348F14A96DF88AAB352D771EC45CB92
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __itow__swprintf
    • String ID:
    • API String ID: 674341424-0
    • Opcode ID: 7b7e272801ecf397d6c386ec2184214c04e66e5c1f35d2d88a05e48c475c535a
    • Instruction ID: d8394cea254a70ef41882d9a82fb43368a9c183f33e4799533063f29314e8fcc
    • Opcode Fuzzy Hash: 7b7e272801ecf397d6c386ec2184214c04e66e5c1f35d2d88a05e48c475c535a
    • Instruction Fuzzy Hash: C522BF716083119FC724DF24D895BAFBBE4BF84718F10691DF496A7292DB30EA44CB92
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID: DtL$DtL$DtL$DtL
    • API String ID: 0-1429224841
    • Opcode ID: b591927936fd40fe1f8818c1f6c47d029dd27f6a6c6ebb23f079d12281cc2b61
    • Instruction ID: 5178ba44c5a5c25bd230ad7332572bdf3f28e8add4fd537783b80c85e6471d32
    • Opcode Fuzzy Hash: b591927936fd40fe1f8818c1f6c47d029dd27f6a6c6ebb23f079d12281cc2b61
    • Instruction Fuzzy Hash: 8F92AF74A04225CFCB24CF58E481AA9B7F1FF58314F64A06AE916BB351D774EC82CB91
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e743540279b989762b0be880f497a9a485527e7fb9f2e54aa75e3d4436766430
    • Instruction ID: 153f5b25a86d9e4695c9714b1df112295683a737dbaf0bfff791cb9a624cdecc
    • Opcode Fuzzy Hash: e743540279b989762b0be880f497a9a485527e7fb9f2e54aa75e3d4436766430
    • Instruction Fuzzy Hash: 7D12D271500204ABEB258F24DD49FAE7BF4EF4A314F20652AF915FE2A1EF70A945CB10
    APIs
    • __time64.LIBCMT ref: 00E88B25
      • Part of subcall function 00E4543A: __aulldiv.LIBCMT ref: 00E45463
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __aulldiv__time64
    • String ID: 0uL
    • API String ID: 325419493-4127767690
    • Opcode ID: 2ef028f20e25bc989bd7b728d0492ec4ee56307afdf40b8adaedbc6f0df8c5ac
    • Instruction ID: d0907ab34467ff7dae24a801960e6b1740bbe7790741e0075bc2cf22c2b9a67e
    • Opcode Fuzzy Hash: 2ef028f20e25bc989bd7b728d0492ec4ee56307afdf40b8adaedbc6f0df8c5ac
    • Instruction Fuzzy Hash: 2921D2766255108BC329CF25D441A52B3E1EBA4311B689E6CD4E9CB2D0CA34B905CB94
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7cd98f1285a0d30e5b816e9f47a8e1fb518d1f33f0c8d6b2417291535d7bb1c1
    • Instruction ID: 64a10c682626240294061d2220af8bc530208c7d2f15d054f6e5688a5c093755
    • Opcode Fuzzy Hash: 7cd98f1285a0d30e5b816e9f47a8e1fb518d1f33f0c8d6b2417291535d7bb1c1
    • Instruction Fuzzy Hash: 6622AC74A00235CFDB24DF64E481AAEB7F0FF08304F18A569E856BB351E774A985CB91
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID: ($|
    • API String ID: 0-1631851259
    • Opcode ID: b256197e7111b9932fd89d5c9b443b4e488234a7e3d3d342d2717f0cd05e928a
    • Instruction ID: 4af555607920ed3c9f372c7d5efbe5a115c0a783a3027ee1e064377fee5d6b83
    • Opcode Fuzzy Hash: b256197e7111b9932fd89d5c9b443b4e488234a7e3d3d342d2717f0cd05e928a
    • Instruction Fuzzy Hash: 36323775A007059FD728CF29C4819AAB7F1FF48310B15D5AEE49AEB3A1D770E941CB40
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
    • Instruction ID: 605d236ae15f3e6efd05d3496e67611f1f1de1b7c9e714c8d75e6af57d74014f
    • Opcode Fuzzy Hash: fe7d9b8eee1d273b37d623b7cc6cd26b30c9621dfee01b7311cae72a06f2c816
    • Instruction Fuzzy Hash: 6D322522D69F014DD7239634E872335A288EFB77D8F15E737E819B59A6EB28D4834204
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID: PJJ
    • API String ID: 0-258144419
    • Opcode ID: 9f56f4a328962fb90a34fc3a88c96b69726f9e3444872868eefc29649ad329b2
    • Instruction ID: 7919c5b5664f10087a23cca87bd3a7c05bd247cc326c96b2e585b31ceedde495
    • Opcode Fuzzy Hash: 9f56f4a328962fb90a34fc3a88c96b69726f9e3444872868eefc29649ad329b2
    • Instruction Fuzzy Hash: 84726E75E003199BDB24DF68C8847EEBBB5EF48314F14D1AAE949BB290D7709D81CB90
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
    • Instruction ID: 1c8d2f39c0ee17d11208007135f2460ae947f3667789b13f8c28f60681466d69
    • Opcode Fuzzy Hash: 9a83e6c9a1e03463649304356993a4cc28f03311dd18012bd76db8a2bb8b356c
    • Instruction Fuzzy Hash: B1B11020D2AF414DD72396398835336BB8CAFBB2C5F51D72BFC2670D22EB2185934185
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 77cc1679f561517273241e1fb6eacc63fdf5bf9e2291d1834d89783708c879a2
    • Instruction ID: df60b006a32688f5983ef0f165b7d00357928fa650b15e4fa965875389fc7c8d
    • Opcode Fuzzy Hash: 77cc1679f561517273241e1fb6eacc63fdf5bf9e2291d1834d89783708c879a2
    • Instruction Fuzzy Hash: 1F025B756006119FDB14EF24D885E2AB7E5FF89724F04A85DF889AB362CB31ED41CB81
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __itow__swprintf
    • String ID:
    • API String ID: 674341424-0
    • Opcode ID: 09822404d708ae0afe09a89739b70461fba6797690fd98337f155e6c13e89274
    • Instruction ID: 6786e473cf212f0e0a239bc37bc71c18119925b4fe483627e4157184d1515981
    • Opcode Fuzzy Hash: 09822404d708ae0afe09a89739b70461fba6797690fd98337f155e6c13e89274
    • Instruction Fuzzy Hash: FBE13C71604310AFCB14DF24C895E6ABBE4FF89714F04996DF88AEB262DB30E945CB51
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0acfed8c104553ee0f031015a52969b3383a7e3804369e691b3daa623c5a7133
    • Instruction ID: bf59096d0c32860f38532b2293c52df09e0aae97caa17850f0f5aaf4d2d80a90
    • Opcode Fuzzy Hash: 0acfed8c104553ee0f031015a52969b3383a7e3804369e691b3daa623c5a7133
    • Instruction Fuzzy Hash: 6EA1ADB0102464BED638AB287C45EFF35DCDBA634AB24395DF802F5192CB52DF0092B9
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction ID: 367e1a44d2511216785d486e20588aa6cae9fff50e5563e5491ec653291f989b
    • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
    • Instruction Fuzzy Hash: E8C1A73220509309EF2D4639E43413EBAE16EA27B539A279DF4B3EB5C4FF10D569D620
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction ID: 898cf59b9e80b1851a3c48d80f3ee41afacf428ff7e7a30441225613ed35567e
    • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
    • Instruction Fuzzy Hash: 60C1A73220519309DF2D4639A43403EFBE16E927B539A279DF4B2EB5C4FF10D568E620
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
    • Instruction ID: 7ad04fc5366eab971c007b132a7b16ef2b67cc46906ed96d0f7454d040e5b94c
    • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
    • Instruction Fuzzy Hash: 2CC1D9322050530AEF1D4639A43403EFAE16EA27B535A27ADF4B3EB5D4FF10D569D620
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction ID: aacceb637035f04313d4b4b668f24ea20c4d3794b0da57b2240bedd3bc6220ec
    • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
    • Instruction Fuzzy Hash: 3FC1B43230515309EF2D463AA47403EBBE16EA27B535A27DDE4B2EB4C4FF10D5A99610

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1726 e26a3c-e26a62 call e40ff6 call e2538e 1731 e26a64-e26a66 1726->1731 1732 e26a89-e26a9b call e43a0b 1726->1732 1733 e26a67-e26a6c 1731->1733 1738 e26bd2-e26bd4 1732->1738 1739 e26aa1-e26ab3 call e43a0b 1732->1739 1736 e26a7e-e26a86 1733->1736 1737 e26a6e-e26a7d call e4106c * 2 1733->1737 1737->1736 1745 e26bda-e26bdd 1738->1745 1739->1745 1746 e26ab9-e26acb call e43a0b 1739->1746 1748 e26be4-e26be7 1745->1748 1752 e26ad1-e26ae3 call e43a0b 1746->1752 1753 e5e6e3-e5e6e6 1746->1753 1750 e26b4b-e26b57 call e259cd 1748->1750 1759 e5e820-e5e825 1750->1759 1760 e26b5d-e26b80 call e2710a call e270bd call e43a0b 1750->1760 1757 e5e6ee-e5e716 call e3fec6 call e270bd call e2710a call e42e3c 1752->1757 1763 e26ae9-e26afb call e43a0b 1752->1763 1753->1757 1802 e5e74d-e5e750 1757->1802 1803 e5e718-e5e71e 1757->1803 1759->1733 1762 e5e82b-e5e82c 1759->1762 1760->1748 1788 e26b82-e26b94 call e43a0b 1760->1788 1766 e5e831-e5e83b call e7fcb1 1762->1766 1775 e26b01-e26b13 call e43a0b 1763->1775 1776 e5e771-e5e776 1763->1776 1774 e5e840-e5e842 1766->1774 1786 e5e7b3-e5e7c3 call e8000d 1775->1786 1787 e26b19-e26b2b call e43a0b 1775->1787 1776->1738 1779 e5e77c-e5e78e call e27a68 1776->1779 1795 e5e790-e5e794 1779->1795 1796 e5e79b-e5e7a6 1779->1796 1809 e5e7c5-e5e811 call e27f41 * 2 call e2716b call e26bec call e25a64 * 2 1786->1809 1810 e5e818-e5e81e 1786->1810 1804 e26b45-e26b48 1787->1804 1805 e26b2d-e26b3f call e43a0b 1787->1805 1788->1748 1806 e26b96-e26ba8 call e43a0b 1788->1806 1795->1779 1797 e5e796 1795->1797 1796->1733 1799 e5e7ac 1796->1799 1797->1738 1799->1786 1807 e5e752-e5e760 1802->1807 1808 e5e73b-e5e748 call e4106c 1802->1808 1803->1802 1811 e5e720-e5e729 1803->1811 1804->1750 1805->1738 1805->1804 1823 e26baa-e26bbc call e43a0b 1806->1823 1824 e26bbe-e26bc7 1806->1824 1820 e5e765-e5e76c call e4106c 1807->1820 1808->1766 1809->1774 1841 e5e813 1809->1841 1810->1766 1811->1808 1816 e5e72b-e5e72e 1811->1816 1816->1808 1822 e5e730-e5e739 1816->1822 1820->1738 1822->1820 1823->1750 1823->1824 1824->1733 1830 e26bcd 1824->1830 1830->1750 1841->1738
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __wcsnicmp
    • String ID:
    • API String ID: 1038674560-0
    • Opcode ID: 0931da494cef05cec8b91f0bd4c9705f932a48058e9e9bcdb53fe5057f95192b
    • Instruction ID: d91473ff81e2cca6ad8cfefcb38ca7fa8a00aef0ff8778cfb059f0c8b69ab891
    • Opcode Fuzzy Hash: 0931da494cef05cec8b91f0bd4c9705f932a48058e9e9bcdb53fe5057f95192b
    • Instruction Fuzzy Hash: 09813CB0640225BBCF24AF30ED82FEF77A8AF14304F146125FD45BA182EB60EB59D255

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1842 e846d6-e846f2 1844 e846fb-e84751 call e40ff6 call e42e3c call e40ff6 call e42ffc call e4378c 1842->1844 1845 e846f4-e846f6 1842->1845 1858 e847e7-e847f6 call e4313d 1844->1858 1859 e84757-e84772 call e42fcd call e43bba 1844->1859 1846 e848a3-e848a9 1845->1846 1864 e847f8-e8481d call e442ee call e4106c * 2 1858->1864 1865 e84822-e84836 1858->1865 1871 e847de-e847e6 call e42fcd 1859->1871 1872 e84774-e8478c 1859->1872 1864->1846 1874 e84838-e84847 call e4378c 1865->1874 1875 e84890-e848a2 call e4106c * 2 1865->1875 1871->1858 1885 e847ba-e847c6 call e42fcd 1872->1885 1886 e8478e-e847b8 call e3fd71 * 2 1872->1886 1890 e84849-e84870 call e438d8 1874->1890 1891 e84872-e84885 call e442ee 1874->1891 1875->1846 1901 e847c7-e847dc call e42fcd * 2 1885->1901 1886->1901 1902 e8488c 1890->1902 1891->1902 1901->1858 1902->1875
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscat$_wcscmp_wcscpy_wcsncpy_wcsstr
    • String ID:
    • API String ID: 3576275495-0
    • Opcode ID: 94cdbcfc506f87f95492efacfbea3f2d752ded87778f8e838e5bfb1cadab23a8
    • Instruction ID: 3afd38a839c6b1f2d5c04d2f923a57f9eea268a5cca4d6e661dc08a172da370e
    • Opcode Fuzzy Hash: 94cdbcfc506f87f95492efacfbea3f2d752ded87778f8e838e5bfb1cadab23a8
    • Instruction Fuzzy Hash: AB410571A002017AEB14BB74AC46FBF77ECEF41710F50106AF908F6182EB759A0597A9

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1908 e47040-e47059 1909 e47073-e47088 call e43020 1908->1909 1910 e4705b-e47065 call e48d68 call e48ff6 1908->1910 1909->1910 1916 e4708a-e4708d 1909->1916 1917 e4706a 1910->1917 1918 e470a1-e470a7 1916->1918 1919 e4708f 1916->1919 1922 e4706c-e47072 1917->1922 1920 e470b3-e470c4 call e53f0c call e53c63 1918->1920 1921 e470a9 1918->1921 1923 e47095-e4709f call e48d68 1919->1923 1924 e47091-e47093 1919->1924 1932 e472af-e472b9 call e49006 1920->1932 1933 e470ca-e470d6 call e53c8d 1920->1933 1921->1923 1925 e470ab-e470b1 1921->1925 1923->1917 1924->1918 1924->1923 1925->1920 1925->1923 1933->1932 1938 e470dc-e470e8 call e53cb7 1933->1938 1938->1932 1941 e470ee-e470f5 1938->1941 1942 e47165-e47170 call e53ce1 1941->1942 1943 e470f7 1941->1943 1942->1922 1950 e47176-e47179 1942->1950 1945 e47101-e4711d call e53ce1 1943->1945 1946 e470f9-e470ff 1943->1946 1945->1922 1951 e47123-e47126 1945->1951 1946->1942 1946->1945 1952 e471a8-e471b5 1950->1952 1953 e4717b-e47184 call e53f5c 1950->1953 1955 e4712c-e47135 call e53f5c 1951->1955 1956 e47268-e4726a 1951->1956 1957 e471b7-e471c6 call e54750 1952->1957 1953->1952 1961 e47186-e471a6 1953->1961 1955->1956 1964 e4713b-e47153 call e53ce1 1955->1964 1956->1922 1965 e471d3-e471fa call e546a0 call e54750 1957->1965 1966 e471c8-e471d0 1957->1966 1961->1957 1964->1922 1971 e47159-e47160 1964->1971 1974 e471fc-e47205 1965->1974 1975 e47208-e4722f call e546a0 call e54750 1965->1975 1966->1965 1971->1956 1974->1975 1980 e47231-e4723a 1975->1980 1981 e4723d-e4724c call e546a0 1975->1981 1980->1981 1984 e4724e 1981->1984 1985 e47279-e47292 1981->1985 1988 e47254-e47262 1984->1988 1989 e47250-e47252 1984->1989 1986 e47294-e472ad 1985->1986 1987 e47265 1985->1987 1986->1956 1987->1956 1988->1987 1989->1988 1990 e4726f-e47271 1989->1990 1990->1956 1991 e47273 1990->1991 1991->1985 1992 e47275-e47277 1991->1992 1992->1956 1992->1985
    APIs
    • _memset.LIBCMT ref: 00E4707B
      • Part of subcall function 00E48D68: __getptd_noexit.LIBCMT ref: 00E48D68
    • __gmtime64_s.LIBCMT ref: 00E47114
    • __gmtime64_s.LIBCMT ref: 00E4714A
    • __gmtime64_s.LIBCMT ref: 00E47167
    • __allrem.LIBCMT ref: 00E471BD
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E471D9
    • __allrem.LIBCMT ref: 00E471F0
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E4720E
    • __allrem.LIBCMT ref: 00E47225
    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E47243
    • __invoke_watson.LIBCMT ref: 00E472B4
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
    • String ID:
    • API String ID: 384356119-0
    • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
    • Instruction ID: a894b1b025fa0eb56b5d975a28b471de4d193b92b34753072ea5fa52b6b18987
    • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
    • Instruction Fuzzy Hash: 8A7116B1A09716ABD7149E79EC41B9AB3E8AF50328F10523AF854F7681E770D94487D0

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2204 e893df-e8948f call e51b90 call e40ff6 call e2538e call e891e9 call e25045 call e4378c 2217 e89542-e89549 call e899be 2204->2217 2218 e89495-e8949c call e899be 2204->2218 2223 e8954b-e8954d 2217->2223 2224 e89552 2217->2224 2218->2223 2225 e894a2-e89540 call e4432e call e42ffc call e42fcd call e4432e call e42fcd * 2 2218->2225 2226 e897b4-e897b5 2223->2226 2228 e89555-e89611 call e2506b * 8 call e89b6d call e4548b 2224->2228 2225->2228 2231 e897d2-e897e2 call e25371 2226->2231 2263 e8961a-e89635 call e8922f 2228->2263 2264 e89613-e89615 2228->2264 2267 e8963b-e89643 2263->2267 2268 e896c7-e896d3 call e455d6 2263->2268 2264->2226 2269 e8964b 2267->2269 2270 e89645-e89649 2267->2270 2275 e896e9-e896ed 2268->2275 2276 e896d5-e896e4 2268->2276 2272 e89650-e8966e call e2506b 2269->2272 2270->2272 2280 e89698-e896be call e88bdd call e44a93 2272->2280 2281 e89670-e89675 2272->2281 2278 e8978f-e897a3 2275->2278 2279 e896f3-e8977c call e442ee call e89c74 call e88d90 2275->2279 2276->2226 2289 e897a5-e897b2 2278->2289 2290 e897b7-e897cd call e89b2c 2278->2290 2279->2290 2304 e8977e-e8978d 2279->2304 2280->2267 2303 e896c4 2280->2303 2286 e89678-e8968b call e89367 2281->2286 2299 e8968d-e89696 2286->2299 2289->2226 2290->2231 2299->2280 2303->2268 2304->2226
    APIs
      • Part of subcall function 00E891E9: __time64.LIBCMT ref: 00E891F3
      • Part of subcall function 00E25045: _fseek.LIBCMT ref: 00E2505D
    • __wsplitpath.LIBCMT ref: 00E894BE
      • Part of subcall function 00E4432E: __wsplitpath_helper.LIBCMT ref: 00E4436E
    • _wcscpy.LIBCMT ref: 00E894D1
    • _wcscat.LIBCMT ref: 00E894E4
    • __wsplitpath.LIBCMT ref: 00E89509
    • _wcscat.LIBCMT ref: 00E8951F
    • _wcscat.LIBCMT ref: 00E89532
      • Part of subcall function 00E8922F: _memmove.LIBCMT ref: 00E89268
      • Part of subcall function 00E8922F: _memmove.LIBCMT ref: 00E89277
    • _wcscmp.LIBCMT ref: 00E89479
      • Part of subcall function 00E899BE: _wcscmp.LIBCMT ref: 00E89AAE
      • Part of subcall function 00E899BE: _wcscmp.LIBCMT ref: 00E89AC1
    • _wcsncpy.LIBCMT ref: 00E8974F
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscat_wcscmp$__wsplitpath_memmove$__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
    • String ID:
    • API String ID: 2744720387-0
    • Opcode ID: 7bde44c990673b2af3bc100e7e87403791543089c4b2218ce68508d90e78ae60
    • Instruction ID: 525d3109725297121358a5d98e4ec2e02a69a970ec1af5c380b521e900513f18
    • Opcode Fuzzy Hash: 7bde44c990673b2af3bc100e7e87403791543089c4b2218ce68508d90e78ae60
    • Instruction Fuzzy Hash: F0C14CB1D00229AACF11EF94DD85EEEB7BCAF44300F0450AAF60DF6152EB319A449F65

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 2306 e7c072-e7c091 call e416c4 2309 e7c093 2306->2309 2310 e7c0a2-e7c0b3 call e416c4 2306->2310 2311 e7c096-e7c09d 2309->2311 2315 e7c0b5-e7c0b8 2310->2315 2316 e7c0ba-e7c0cb call e416c4 2310->2316 2313 e7c15a-e7c15e 2311->2313 2315->2311 2316->2315 2319 e7c0cd-e7c0de call e416c4 2316->2319 2322 e7c0e7-e7c0f8 call e416c4 2319->2322 2323 e7c0e0-e7c0e5 2319->2323 2322->2323 2326 e7c0fa-e7c10b call e416c4 2322->2326 2323->2311 2329 e7c112-e7c123 call e416c4 2326->2329 2330 e7c10d-e7c110 2326->2330 2333 e7c125-e7c128 2329->2333 2334 e7c12d-e7c13e call e416c4 2329->2334 2330->2311 2333->2311 2334->2309 2337 e7c144-e7c148 2334->2337 2338 e7c155 2337->2338 2339 e7c14a-e7c153 call e7c161 2337->2339 2338->2313 2339->2313
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memcmp
    • String ID:
    • API String ID: 2931989736-0
    • Opcode ID: c12ac602da8119e874521257cd9dfaa127012efb1a5dc6b425e7bf2f3418d560
    • Instruction ID: 36494b664fc7a1595e9c40d39ab15d5bd008b8e9a97b0289a0bcbcdf8fd49131
    • Opcode Fuzzy Hash: c12ac602da8119e874521257cd9dfaa127012efb1a5dc6b425e7bf2f3418d560
    • Instruction Fuzzy Hash: E5210761601205B7DA10A520AD42FAF27ACAF10398F34A079FD0DB6286F755DD1181E5

    Control-flow Graph

    APIs
    • __swprintf.LIBCMT ref: 00E8CAFB
    • __swprintf.LIBCMT ref: 00E8CB3E
      • Part of subcall function 00E27F41: _memmove.LIBCMT ref: 00E27F82
    • __swprintf.LIBCMT ref: 00E8CB92
      • Part of subcall function 00E438D8: __woutput_l.LIBCMT ref: 00E43931
    • __swprintf.LIBCMT ref: 00E8CBE0
      • Part of subcall function 00E438D8: __flsbuf.LIBCMT ref: 00E43953
      • Part of subcall function 00E438D8: __flsbuf.LIBCMT ref: 00E4396B
    • __swprintf.LIBCMT ref: 00E8CC2F
    • __swprintf.LIBCMT ref: 00E8CC7E
    • __swprintf.LIBCMT ref: 00E8CCCD
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __swprintf$__flsbuf$__woutput_l_memmove
    • String ID:
    • API String ID: 1085135966-0
    • Opcode ID: 56caca95bc29ac1748e1b54578c136374a5eabc245eea90b4cbabceb48a1cedd
    • Instruction ID: 2eab42da828f59ee0c186433c160803ad2fc17ebde70eb59bbe957a4b3c00c4b
    • Opcode Fuzzy Hash: 56caca95bc29ac1748e1b54578c136374a5eabc245eea90b4cbabceb48a1cedd
    • Instruction Fuzzy Hash: F6A141B2508314ABC714FB64D986DAFB7ECFF94700F406919F586E2192EB34DA48C762

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3145 e7b397-e7b3c0 3147 e7b3c2-e7b3c4 3145->3147 3148 e7b3c8-e7b3cc 3145->3148 3147->3148 3149 e7b3ce-e7b3f5 call e4378c 3148->3149 3150 e7b3fd-e7b401 3148->3150 3166 e7b3f7 3149->3166 3167 e7b3f8-e7b3f9 3149->3167 3151 e7b407-e7b41e 3150->3151 3152 e7b4bc-e7b4c0 3150->3152 3164 e7b437-e7b43f 3151->3164 3165 e7b420-e7b430 call e42e3c 3151->3165 3153 e7b4c2-e7b503 call e27f41 call e35d24 call e25a64 call e7f8b4 3152->3153 3154 e7b53d-e7b541 3152->3154 3241 e7b505-e7b509 3153->3241 3242 e7b534-e7b539 3153->3242 3158 e7b543-e7b584 call e27f41 call e35d24 call e25a64 call e7f8b4 3154->3158 3159 e7b58c-e7b590 3154->3159 3245 e7b587-e7b58b 3158->3245 3246 e7b586 3158->3246 3162 e7b5a6-e7b5af 3159->3162 3163 e7b592-e7b594 3159->3163 3173 e7b5b1-e7b5c4 3162->3173 3174 e7b61c-e7b61f 3162->3174 3169 e7b596-e7b5a2 call e7b66a 3163->3169 3170 e7b5a5 3163->3170 3175 e7b441-e7b442 3164->3175 3176 e7b46d-e7b47d call e438a2 3164->3176 3165->3164 3166->3167 3167->3150 3169->3170 3210 e7b5a4 3169->3210 3170->3162 3198 e7b5c6-e7b5d0 3173->3198 3199 e7b5d4-e7b5de 3173->3199 3177 e7b621-e7b623 3174->3177 3178 e7b63b-e7b63d 3174->3178 3184 e7b444-e7b445 3175->3184 3185 e7b458-e7b469 call e43bba 3175->3185 3202 e7b480-e7b482 3176->3202 3186 e7b625-e7b637 3177->3186 3187 e7b63a 3177->3187 3189 e7b63f-e7b65c call e234c2 3178->3189 3190 e7b65e-e7b660 3178->3190 3196 e7b447-e7b456 call e4378c 3184->3196 3197 e7b485-e7b489 3184->3197 3185->3197 3216 e7b46b 3185->3216 3186->3187 3206 e7b639 3186->3206 3187->3178 3208 e7b661-e7b667 3189->3208 3190->3208 3196->3202 3203 e7b4b7-e7b4b8 3197->3203 3204 e7b48b-e7b4b1 call e4378c 3197->3204 3211 e7b5d3 3198->3211 3212 e7b5d2 3198->3212 3214 e7b5e0-e7b5e6 3199->3214 3215 e7b5ea-e7b5f0 3199->3215 3202->3197 3217 e7b484 3202->3217 3203->3152 3204->3203 3239 e7b4b3 3204->3239 3206->3187 3210->3170 3211->3199 3212->3211 3221 e7b5e9 3214->3221 3222 e7b5e8 3214->3222 3223 e7b604-e7b60a 3215->3223 3224 e7b5f2-e7b600 3215->3224 3216->3217 3217->3197 3221->3215 3222->3221 3223->3174 3230 e7b60c-e7b618 3223->3230 3228 e7b603 3224->3228 3229 e7b602 3224->3229 3228->3223 3229->3228 3234 e7b61b 3230->3234 3235 e7b61a 3230->3235 3234->3174 3235->3234 3239->3203 3243 e7b533 3241->3243 3244 e7b50b-e7b531 call e4378c 3241->3244 3242->3154 3243->3242 3244->3242 3244->3243 3245->3159 3246->3245
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscmp$_wcsstr
    • String ID: @
    • API String ID: 3312506106-2766056989
    • Opcode ID: 26f0174115f4de1ad349d66af205d20e13eb213b035462e9321afc0d08666d5a
    • Instruction ID: 0ea52ecf0d1f7e494dc6be9b4dc1c41023534a50b0bc4f77116a6e81f70fd473
    • Opcode Fuzzy Hash: 26f0174115f4de1ad349d66af205d20e13eb213b035462e9321afc0d08666d5a
    • Instruction Fuzzy Hash: C781A0710083059FDB14DF10D885FAA7BE8EF44318F14E56AFD89AA096EB34DD49CB61

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3452 e8675a-e86767 3453 e8676d-e86771 3452->3453 3454 e868d0-e868dc call e277c7 3452->3454 3453->3454 3456 e86777-e86781 3453->3456 3460 e8694c-e86950 3454->3460 3461 e868de-e868ec call e765fa 3454->3461 3458 e86845-e86849 3456->3458 3459 e86787-e86798 call e277c7 3456->3459 3463 e8688a-e868c5 call e40ff6 call e41080 call e29bf8 call e4106c 3458->3463 3464 e8684b-e86888 call e40ff6 call e41080 call e8573e call e29bf8 call e4106c * 2 3458->3464 3474 e8679a-e867a5 call e29997 3459->3474 3475 e867fb-e86808 call e29997 3459->3475 3468 e8696e-e8697f call e41080 3460->3468 3469 e86952-e8696c call e41080 3460->3469 3482 e868ee-e868f3 call e29c9c 3461->3482 3483 e868f5-e868ff call e29997 3461->3483 3519 e868ca-e868cb 3463->3519 3464->3519 3486 e86982-e86991 call e85d6f call e29b9c 3468->3486 3469->3486 3493 e867b5-e867f6 call e29997 call e279ab call e29b9c call e85b29 call e41080 call e4106c 3474->3493 3494 e867a7-e867b4 call e29997 3474->3494 3497 e86818-e86840 call e29997 call e279ab call e29b9c 3475->3497 3498 e8680a-e86817 call e29997 3475->3498 3502 e86902-e86925 call e85d6f call e29b9c call e27b52 3482->3502 3483->3502 3522 e86996-e86999 call e25a64 3486->3522 3493->3522 3494->3493 3541 e8693f-e8694a call e41080 3497->3541 3498->3497 3542 e86933-e8693c 3502->3542 3543 e86927-e86931 3502->3543 3525 e8699e-e869a6 3519->3525 3522->3525 3541->3522 3546 e8693e 3542->3546 3543->3546 3546->3541
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memmove$__itow__swprintf
    • String ID:
    • API String ID: 3253778849-0
    • Opcode ID: c980da28a62c4ba725a147fb03ad7cf39ad065675ec9d8c85ca63c75a62be2be
    • Instruction ID: 2e14432239239e9aa772e5f1b89fed062146fd83e55c80882b37ab68dd35c858
    • Opcode Fuzzy Hash: c980da28a62c4ba725a147fb03ad7cf39ad065675ec9d8c85ca63c75a62be2be
    • Instruction Fuzzy Hash: B3619A3050066A9BDF15FF24D882EFE37E4AF88308F046559F85D7B292DB31A945CB90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3552 e84f63-e84fad call e51b90 call e848aa * 2 call e84cd3 3561 e84faf-e84fb1 3552->3561 3562 e84fb6-e84fc6 call e84cd3 3552->3562 3563 e851c4-e851c9 3561->3563 3566 e84fcc-e84fd0 3562->3566 3567 e85092-e850d7 call e27f41 * 2 call e84c69 call e25a64 * 2 3562->3567 3566->3561 3568 e84fd2-e84fea 3566->3568 3593 e850d9-e850f1 call e838ad 3567->3593 3594 e8512c-e85145 call e4378c 3567->3594 3574 e84fec-e85005 call e4378c 3568->3574 3575 e8502e-e8507c call e4432e call e42fcd * 2 3568->3575 3584 e85027-e85029 3574->3584 3585 e85007-e85022 3574->3585 3575->3567 3595 e8507e-e85091 call e42fcd 3575->3595 3584->3563 3585->3563 3593->3561 3603 e850f7-e85127 call e27f41 call e853c5 call e25a64 3593->3603 3594->3561 3602 e8514b-e851c2 call e42e3c * 2 3594->3602 3595->3567 3602->3563 3603->3563
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscmp
    • String ID:
    • API String ID: 856254489-0
    • Opcode ID: ba19efe675873d0c81a9ddd57d43b08cfe129d5363b37745d707531d05513a48
    • Instruction ID: 929e64727b81b8b5471c4018081aea3aec16a6c526473ff466597ef3b6e7f48e
    • Opcode Fuzzy Hash: ba19efe675873d0c81a9ddd57d43b08cfe129d5363b37745d707531d05513a48
    • Instruction Fuzzy Hash: 755175B21087859BD724EB60D8819DFB3ECEF84340F40592EB28DE3191EF74A58C8766

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3615 e29997-e299a9 3616 e299b1-e299b5 3615->3616 3617 e299ab-e299b0 3615->3617 3618 e299b7-e299c7 call e43700 3616->3618 3619 e299eb-e299ec 3616->3619 3630 e299ca-e299d4 call e40ff6 3618->3630 3621 e299f2-e299f3 3619->3621 3622 e5fa01-e5fa0f call e436d0 3619->3622 3623 e5f903-e5f906 3621->3623 3624 e299f9-e29a14 call e438d8 3621->3624 3631 e5fa14 3622->3631 3628 e5f90c-e5f911 3623->3628 3629 e5f9e9-e5f9fc call e438d8 3623->3629 3624->3630 3633 e5f9c5-e5f9ce 3628->3633 3634 e5f917-e5f918 3628->3634 3629->3622 3646 e299e6-e299e9 3630->3646 3647 e299d6-e299e4 call e27f41 3630->3647 3631->3631 3637 e5f9d7 3633->3637 3638 e5f9d0-e5f9d5 3633->3638 3639 e5f98d-e5f9c0 call e42ffc call e25a64 3634->3639 3640 e5f91a-e5f91b 3634->3640 3643 e5f9dc-e5f9e3 call e42ffc 3637->3643 3638->3643 3639->3633 3644 e5f91d-e5f91f 3640->3644 3645 e5f92b-e5f94f call e40ff6 3640->3645 3643->3629 3644->3645 3657 e5f951-e5f960 call e857ad 3645->3657 3658 e5f962-e5f964 3645->3658 3646->3617 3647->3646 3660 e5f967-e5f971 call e40ff6 3657->3660 3658->3660 3665 e5f973-e5f97b call e27f41 3660->3665 3666 e5f97d-e5f987 call e4106c 3660->3666 3665->3666 3666->3639
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __i64tow__itow__swprintf
    • String ID:
    • API String ID: 421087845-0
    • Opcode ID: 3f5488ad3a946cab8c056db5eb318d354419bc3af618c4ea88005c1c2f23587b
    • Instruction ID: 7ad64d023fb7e215f720848e60ac3568fd2a330b6294404ebc05a303b44fd5ac
    • Opcode Fuzzy Hash: 3f5488ad3a946cab8c056db5eb318d354419bc3af618c4ea88005c1c2f23587b
    • Instruction Fuzzy Hash: 37410671604615AFDB24DF74E842F7673E8EB88314F20686FE549F7282EA3199458B11

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 3671 e8589f-e858b6 3673 e858bc-e858c6 call e42e3c 3671->3673 3674 e85a17 3671->3674 3673->3674 3678 e858cc-e858d4 3673->3678 3676 e85a19-e85a1e 3674->3676 3679 e858da-e8590a call e442ee call e437ca call e42e3c 3678->3679 3680 e85971-e8597b call e42e3c 3678->3680 3679->3680 3695 e8590c-e8593d call e442ee call e437ca call e42e3c 3679->3695 3686 e85981-e859b9 call e442ee call e437ca call e42e3c 3680->3686 3687 e85a12-e85a15 3680->3687 3686->3687 3700 e859bb-e859e8 call e442ee call e437ca call e42e3c 3686->3700 3687->3676 3695->3680 3708 e8593f-e8596c call e442ee call e437ca call e42e3c 3695->3708 3700->3687 3715 e859ea-e85a0e call e442ee call e437ca 3700->3715 3708->3680 3722 e8596e 3708->3722 3715->3687 3722->3680
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcsncpy
    • String ID:
    • API String ID: 1735881322-0
    • Opcode ID: 7a73a9d8b045da8df5336bb66c02e39a5d5c0cabf30c4969930a264d4c6a1f2d
    • Instruction ID: 49538a72f8e206366c876349b7503a729e05e75487dee6cf64efcebcd7e76137
    • Opcode Fuzzy Hash: 7a73a9d8b045da8df5336bb66c02e39a5d5c0cabf30c4969930a264d4c6a1f2d
    • Instruction Fuzzy Hash: 064160A6C2051876CB51FBB5988AACFB3A8DF04310F50A956F518F3121FB34E715C7A9
    APIs
    • __init_pointers.LIBCMT ref: 00E49D26
      • Part of subcall function 00E433C7: __initp_misc_winsig.LIBCMT ref: 00E433E5
    • __mtinitlocks.LIBCMT ref: 00E49D2B
    • __mtterm.LIBCMT ref: 00E49D34
      • Part of subcall function 00E49D9C: _free.LIBCMT ref: 00E49E9D
    • __calloc_crt.LIBCMT ref: 00E49D59
    • __initptd.LIBCMT ref: 00E49D7B
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
    • String ID:
    • API String ID: 206718379-0
    • Opcode ID: 0032ce98d80b6da20572b252ff7a2ec3726a0071997436604a018428a97a3cd4
    • Instruction ID: 7fc9779b9aa90de271e7c965dd8cf2cbd3bf1cccaec33cbab7db9af7c8cb36f4
    • Opcode Fuzzy Hash: 0032ce98d80b6da20572b252ff7a2ec3726a0071997436604a018428a97a3cd4
    • Instruction Fuzzy Hash: 46F05E72A597126AE6347BB8BC0779B26D4EF01734F206B3AF468F50E3FF2098414594
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __swprintf_memset_wcsncpy
    • String ID: :$\
    • API String ID: 214737766-1166558509
    • Opcode ID: 5f33faa08cb701eabbd1d6ffb6acf6de227f701ccc96ef5130cbe269c31a5bbd
    • Instruction ID: 07631a1b3bdb164b3a887c3cd712553c65308ef238cf9770133e09da84bb615f
    • Opcode Fuzzy Hash: 5f33faa08cb701eabbd1d6ffb6acf6de227f701ccc96ef5130cbe269c31a5bbd
    • Instruction Fuzzy Hash: 3631B371500109ABDB219FA0DC48FEF73BCEF88705F1455BAF90CE2150E77096548B25
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscmp$__swprintf_iswctype
    • String ID:
    • API String ID: 3564621516-0
    • Opcode ID: 4b92ad8b0c6b80a2dfb9578a1e43b2159a4eff4beb40b0b2335c71dd6fe31aaa
    • Instruction ID: c2c3dff73e4966c3aec484dc29b13ffb62dbae702bb3437b06c8ddf03581e59a
    • Opcode Fuzzy Hash: 4b92ad8b0c6b80a2dfb9578a1e43b2159a4eff4beb40b0b2335c71dd6fe31aaa
    • Instruction Fuzzy Hash: D8A1C171204206AFD719DF20C884BAEF7E8FF84319F189639FA9DA2550D730E955CB92
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
    • String ID:
    • API String ID: 1559183368-0
    • Opcode ID: 8dbd51b3496345ca7cb82c2743d3bc8638698ba2a79feaee521bcd0c413a1846
    • Instruction ID: 18f45522e619e12dfbd947f7959408d293017b3a6bb515890221e4aad8321f5b
    • Opcode Fuzzy Hash: 8dbd51b3496345ca7cb82c2743d3bc8638698ba2a79feaee521bcd0c413a1846
    • Instruction Fuzzy Hash: EC51C432A00B05DBDB248F79E8886AE77B5AF40324F25977AF835B72D2D7709D548B40
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscpy$_memmove_strcat
    • String ID:
    • API String ID: 559723171-0
    • Opcode ID: 3e644901dee28f1f78e9cc2e3f0c9b527e20158314d878990267789537b01a74
    • Instruction ID: 4fca59003f1a4f9dea37f2ce24828e85336d4984a749309ce72398d0f75a4fe9
    • Opcode Fuzzy Hash: 3e644901dee28f1f78e9cc2e3f0c9b527e20158314d878990267789537b01a74
    • Instruction Fuzzy Hash: A511F071A04116ABDB20BB64AC0AEDE77ECDF80720F5011BAF50CB2091EF749AC58765
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memcmp
    • String ID:
    • API String ID: 2931989736-0
    • Opcode ID: 136c7ff23bac88b3aafdae7ad22df313182075a9526e151d416b8a52663093c7
    • Instruction ID: 12dbdd76b2f4c65a9443b6e0d50386c0b3c6249741a045eba488334ab0c38d9f
    • Opcode Fuzzy Hash: 136c7ff23bac88b3aafdae7ad22df313182075a9526e151d416b8a52663093c7
    • Instruction Fuzzy Hash: B501DD716451067BEA04A5209D42FAB77EC9F113A8FA490B9FD08B7243F754DE11C2E4
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _iswctype_wcscpy
    • String ID: AU3!$EA06
    • API String ID: 2497406411-2658333250
    • Opcode ID: 8ddd441a78d35076e32a957d01a437332a313098eaf865798266cc633cce37bb
    • Instruction ID: 17630a94eaaaefd3d8ee82572ef8ac23ad7208fb1a6769f12cb297c3e99311ca
    • Opcode Fuzzy Hash: 8ddd441a78d35076e32a957d01a437332a313098eaf865798266cc633cce37bb
    • Instruction Fuzzy Hash: 7302AF711083519FC724EF24D981AAFBBE5BF88314F14591DF89AA72A1DB30DA49CB42
    APIs
      • Part of subcall function 00E29997: __itow.LIBCMT ref: 00E299C2
      • Part of subcall function 00E29997: __swprintf.LIBCMT ref: 00E29A0C
      • Part of subcall function 00E3FEC6: _wcscpy.LIBCMT ref: 00E3FEE9
    • _wcstok.LIBCMT ref: 00E8EEFF
    • _wcscpy.LIBCMT ref: 00E8EF8E
    • _memset.LIBCMT ref: 00E8EFC1
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscpy$__itow__swprintf_memset_wcstok
    • String ID: X
    • API String ID: 774024439-3081909835
    • Opcode ID: 4834a5bba9af908416cba5e6f0ab32a119d71f01a50de142e129c452bab497dc
    • Instruction ID: 9c891a726164d8d33adae61a44a9e214d739898a6c038fa8e48939c74221ae2a
    • Opcode Fuzzy Hash: 4834a5bba9af908416cba5e6f0ab32a119d71f01a50de142e129c452bab497dc
    • Instruction Fuzzy Hash: 52C18E716083109FC724EF24D885A9AB7E0FF84314F10696DF99DA72A2DB30ED45CB92
    APIs
      • Part of subcall function 00E40FF6: std::exception::exception.LIBCMT ref: 00E4102C
      • Part of subcall function 00E40FF6: __CxxThrowException@8.LIBCMT ref: 00E41041
      • Part of subcall function 00E27F41: _memmove.LIBCMT ref: 00E27F82
      • Part of subcall function 00E27BB1: _memmove.LIBCMT ref: 00E27C0B
    • __swprintf.LIBCMT ref: 00E3302D
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
    • String ID: (+I
    • API String ID: 1943609520-2960116247
    • Opcode ID: 33d803d847b3f5c5eab3986870dea013c9ba33329d7410d6cfcc8cbfdeac6615
    • Instruction ID: 89ddd1b42f035010710dff3a44f16098cd5ae81708cea571163322b37b4154f8
    • Opcode Fuzzy Hash: 33d803d847b3f5c5eab3986870dea013c9ba33329d7410d6cfcc8cbfdeac6615
    • Instruction Fuzzy Hash: 25918F712183119FC718EF24E889C6EBBE4EF85754F00691DF486A72A1DA30EE44CB52
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memset$_memmove
    • String ID: ERCP
    • API String ID: 2532777613-1384759551
    • Opcode ID: 25dc1189b28c8648ea83cdad9136b95fe85d6ab8f80ab522c9aa2e22ef6a070d
    • Instruction ID: 8ea78e1464e3213e3f456944ea8ec8f07e9b2a59aa559d41b5b9a388bba4a69f
    • Opcode Fuzzy Hash: 25dc1189b28c8648ea83cdad9136b95fe85d6ab8f80ab522c9aa2e22ef6a070d
    • Instruction Fuzzy Hash: B6519F71900709ABDB24CF65C8857EABBF4FF04318F20D56EE65AEB241E7719A84CB50
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscat$__wsplitpath
    • String ID:
    • API String ID: 1413645957-0
    • Opcode ID: fc3230f8597e6524a7f3363b63e7403b20e8896006eff84071d3e2fe3a36d42b
    • Instruction ID: 9bbf5847e39c6babb453be3c169c7860c80e06e3c4fc1088d12041b1392a2dfd
    • Opcode Fuzzy Hash: fc3230f8597e6524a7f3363b63e7403b20e8896006eff84071d3e2fe3a36d42b
    • Instruction Fuzzy Hash: 458150B15082459FCB24FF24C8459AAB7E8BB88314F15A82EF88DE7291E731DD44CB52
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscat$__wsplitpath_wcscpy
    • String ID:
    • API String ID: 3240238573-0
    • Opcode ID: dcc13d4e5357b2cc399167f9022ebe31d76fa79487d8bad422ff16d79010f260
    • Instruction ID: 161a28237430dd6420f9404a44fddd7a5656a57101a41f4bcadb2a8fc6f9faa2
    • Opcode Fuzzy Hash: dcc13d4e5357b2cc399167f9022ebe31d76fa79487d8bad422ff16d79010f260
    • Instruction Fuzzy Hash: C36158B25083159FDB10EF20D8419AEB3E8FF89314F04596EF98DA7291DB31E949CB52
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __swprintf_wprintf$_memmove
    • String ID:
    • API String ID: 2249476411-0
    • Opcode ID: 4cd43bcf80d0820f65665fea3393de1bcc51a8b0913537eaf14d6fb74990e2d9
    • Instruction ID: 33acf602971218dc1e9baa19dfa9e6ecff303302c89a6de31a83e7c5300d92d9
    • Opcode Fuzzy Hash: 4cd43bcf80d0820f65665fea3393de1bcc51a8b0913537eaf14d6fb74990e2d9
    • Instruction Fuzzy Hash: D6518372900219BADF25FBE0DD86EEEB7B8AF04300F145166F509720A1EB356F58DB61
    APIs
      • Part of subcall function 00E25045: _fseek.LIBCMT ref: 00E2505D
      • Part of subcall function 00E899BE: _wcscmp.LIBCMT ref: 00E89AAE
      • Part of subcall function 00E899BE: _wcscmp.LIBCMT ref: 00E89AC1
    • _free.LIBCMT ref: 00E8992C
    • _free.LIBCMT ref: 00E89933
    • _free.LIBCMT ref: 00E8999E
    • _free.LIBCMT ref: 00E899A6
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _free$_wcscmp$_fseek
    • String ID:
    • API String ID: 3404660211-0
    • Opcode ID: 88e032742d06d326e4d6d5cc1431d5dcb2cd90c0f8f7e6ce6201bb629da5c016
    • Instruction ID: cf23d38f06031519e180d789fb2493790c52ca2decace07de2fa6041d7425096
    • Opcode Fuzzy Hash: 88e032742d06d326e4d6d5cc1431d5dcb2cd90c0f8f7e6ce6201bb629da5c016
    • Instruction Fuzzy Hash: 0F512DB1D04258AFDF249F64DC41AAEBBB9EF48310F1414AEB60DB7241DB715A808F59
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __swprintf_wprintf$_memmove
    • String ID:
    • API String ID: 2249476411-0
    • Opcode ID: 919a289ee3f523d30e238457d5dcd5ad8f839c127a8fc31a7f0e566c568d85a8
    • Instruction ID: 20e015fac1a4e1ad8b4f44a75a43154fed2b3703c30fe605195bebaa1b602f8b
    • Opcode Fuzzy Hash: 919a289ee3f523d30e238457d5dcd5ad8f839c127a8fc31a7f0e566c568d85a8
    • Instruction Fuzzy Hash: 1051A572900219BADF15FBE0DD82EEEB7B9AF08300F245166F50972091EB752F58DB61
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __flsbuf__flush__getptd_noexit__write_memmove
    • String ID:
    • API String ID: 2782032738-0
    • Opcode ID: c493345b90a54299f19da1f1b80ffad1cdca9c45b265d9ae20e396771537fb45
    • Instruction ID: f2717002921725bdb2039d2f895175ad1a3a6da40a749e085468a2ea65858a36
    • Opcode Fuzzy Hash: c493345b90a54299f19da1f1b80ffad1cdca9c45b265d9ae20e396771537fb45
    • Instruction Fuzzy Hash: FC41E8B1B006069BDF18CE69E880BAF77A5EFC4354B24913DE955E76C0E770DD40A744
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __write$__getbuf__getptd_noexit__lseeki64
    • String ID:
    • API String ID: 4182129353-0
    • Opcode ID: 3a829089bdaea1667142616d274cfe03e737d4b106993d1ff820ab1d966bf4dc
    • Instruction ID: f4aa9f6287dbf539188662a0d492de98881dfa20b6c7502118783f04564d0a43
    • Opcode Fuzzy Hash: 3a829089bdaea1667142616d274cfe03e737d4b106993d1ff820ab1d966bf4dc
    • Instruction Fuzzy Hash: C7411575500B01EFD7249F68E841AFA73E4EF81325F049A2DEC66AB6E2D734EC048B10
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscmp
    • String ID:
    • API String ID: 856254489-0
    • Opcode ID: 58bcf13c288eddfd2e692422b01c0418072611c199188e78e98c6afa980456a9
    • Instruction ID: 11ac4850ace311d002d418c565b394d68024d0482904ee7bb21bf621504f0657
    • Opcode Fuzzy Hash: 58bcf13c288eddfd2e692422b01c0418072611c199188e78e98c6afa980456a9
    • Instruction Fuzzy Hash: 5331C7765012196EDB10EBB4EC48ADE77AC9F48365F1005B6E808F30A0DB34DA49CB64
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscmp
    • String ID:
    • API String ID: 856254489-0
    • Opcode ID: ec6b9d9e702f045fbfb62a8a4d4bf93f4726aadb3ab887182078068f471a89aa
    • Instruction ID: 04ab077f3cc2591b1e166206cd4180f90c321a6d8019f7c174ed1797ee0519f3
    • Opcode Fuzzy Hash: ec6b9d9e702f045fbfb62a8a4d4bf93f4726aadb3ab887182078068f471a89aa
    • Instruction Fuzzy Hash: E131B5715012196ACB20BBB4EC88ADF77AC9F49364F201576E85CF30A0D735DA59CB64
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
    • String ID:
    • API String ID: 3016257755-0
    • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
    • Instruction ID: 017a2453cbcfcc24944b531973d880baaf62571aaa98cc22983e5ef917dba6fa
    • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
    • Instruction Fuzzy Hash: EE01807A05414ABBCF125E84EC01CEE3F62BF59346F099915FE9868031D237C9B9AB81
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: __itow_s
    • String ID: xrL$xrL
    • API String ID: 3653519197-2396213246
    • Opcode ID: 6cdbd28f4cd270a4002642e91cc7d34447675df6c538d3934ab11c2a8ded0c4f
    • Instruction ID: 2f351a27feabdc4376cc4884957ab0e03efce1636e296a56974c4ead96469653
    • Opcode Fuzzy Hash: 6cdbd28f4cd270a4002642e91cc7d34447675df6c538d3934ab11c2a8ded0c4f
    • Instruction Fuzzy Hash: 41B19D70A00209ABDF14DF54D980EAEB7FAFF58304F149469F945AB252EB70E941CB60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memset
    • String ID:
    • API String ID: 2102423945-3916222277
    • Opcode ID: 7b372a644be77f3f5313eb40cabb9a66cdceb54fd3a95a3fdea66fc4a7f3adc6
    • Instruction ID: 8b4094f643cce7049f1bfc8a4ca75a26ed46ca6a223227b9376e18f5dc635e9f
    • Opcode Fuzzy Hash: 7b372a644be77f3f5313eb40cabb9a66cdceb54fd3a95a3fdea66fc4a7f3adc6
    • Instruction Fuzzy Hash: 90818071940209BFDF11DFA4DD49AEE7BB8EF14308F18952AF928B2161DB318E15DB60
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _wcscat
    • String ID: \
    • API String ID: 2563891980-2967466578
    • Opcode ID: 118cb3ff050fbbb02c10eb19e7119e6ea6e2689824d79bbb51778997a341d715
    • Instruction ID: bc8751bb3d10c10cd2f8bfe31155a41b77a64939716cf10b686f8820d0c37bb5
    • Opcode Fuzzy Hash: 118cb3ff050fbbb02c10eb19e7119e6ea6e2689824d79bbb51778997a341d715
    • Instruction Fuzzy Hash: D6715A715083019FC754EF25EC81DABBBE8FF94350B40587EF485A32A1EB709948CB6A
    APIs
    • _memset.LIBCMT ref: 00E9F75C
    • _memset.LIBCMT ref: 00E9F825
      • Part of subcall function 00E29997: __itow.LIBCMT ref: 00E299C2
      • Part of subcall function 00E29997: __swprintf.LIBCMT ref: 00E29A0C
      • Part of subcall function 00E3FEC6: _wcscpy.LIBCMT ref: 00E3FEE9
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memset$__itow__swprintf_wcscpy
    • String ID: @
    • API String ID: 2523036003-2766056989
    • Opcode ID: ba2112da4e235f177a894c41a925b00fdd6195b9ae917a27f31cb6d548eeaf1d
    • Instruction ID: 35d5deb35b3f1a1f95d0c3f58a4c6bd164dc48db6686a0e82bf1284a60a766c6
    • Opcode Fuzzy Hash: ba2112da4e235f177a894c41a925b00fdd6195b9ae917a27f31cb6d548eeaf1d
    • Instruction Fuzzy Hash: F2619CB5A006299FCF14DFA4D5819AEBBF4FF48314F14A469E84ABB351CB31AD40CB90
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1680216243.0000000000E21000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E20000, based on PE: true
    • Associated: 00000000.00000002.1680197223.0000000000E20000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000EAF000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680273338.0000000000ED5000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EDF000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680346764.0000000000EE3000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1680423161.0000000000EE8000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_e20000_PI No 20000814C.jbxd
    Similarity
    • API ID: _memset
    • String ID: 0$F
    • API String ID: 2102423945-3044882817
    • Opcode ID: 52c22e23c74f252828f5091ec4f41fccbfb650d377574ec2eca5ca95968dfe7a
    • Instruction ID: 33c6bf12b65345b0fd0c064639c2711d57ee47b88b42db753d7a13c840575596
    • Opcode Fuzzy Hash: 52c22e23c74f252828f5091ec4f41fccbfb650d377574ec2eca5ca95968dfe7a
    • Instruction Fuzzy Hash: 7C415674A01205EFDB20DF64D884E9ABBF9FF4E304F144438E965AB360D730A914CB64