Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
filedata.exe

Overview

General Information

Sample name:filedata.exe
(renamed file extension from none to exe)
Original sample name:filedata
Analysis ID:1467815
MD5:7794b42506387d60de24b9c86dc835ee
SHA1:ef90fd11ba251cc7390993e7fb06627e1e35696c
SHA256:fa341b1799bc1f666359ed075ef1873b3482ab24d9d6de7f2ec6b70b9faad717
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • filedata.exe (PID: 5168 cmdline: "C:\Users\user\Desktop\filedata.exe" MD5: 7794B42506387D60DE24B9C86DC835EE)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: filedata.exeAvira: detected
Source: filedata.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: filedata.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\DevRepos\ProfessionalServices\PEAC\Projects\Custom\PSImport\obj\Debug\PEACPSImport.pdb source: filedata.exe
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: filedata.exe, 00000000.00000002.3279089458.0000000000B32000.00000004.00000020.00020000.00000000.sdmp
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: filedata.exeString found in binary or memory: http://www.archivesystems.com/
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_0995D2A8 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_0995D2A8
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_0102C1B80_2_0102C1B8
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_071EE0B00_2_071EE0B0
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_071E3F200_2_071E3F20
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_071E0F180_2_071E0F18
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_071E3F100_2_071E3F10
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_071E0F070_2_071E0F07
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_09959A490_2_09959A49
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_09956CA00_2_09956CA0
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_09955C180_2_09955C18
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_09959A490_2_09959A49
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_09955C180_2_09955C18
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_099813480_2_09981348
Source: filedata.exe, 00000000.00000002.3279996737.00000000029F4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Runtime.Remoting.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.00000000029F4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $cq,\\StringFileInfo\\040904B0\\OriginalFilename vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.00000000029F4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesystem.data.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279089458.0000000000AFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorlib.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $cq,\\StringFileInfo\\040904B0\\OriginalFilename vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePEACPSImport.exe: vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $cq,\\StringFileInfo\\000004B0\\OriginalFilename vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMicrosoft.VisualBasic.DLLT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Windows.Forms.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Drawing.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Configuration.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Core.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSystem.Xml.dllT vs filedata.exe
Source: filedata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs filedata.exe
Source: filedata.exe, 00000000.00000000.2032970445.0000000000650000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePEACPSImport.exe: vs filedata.exe
Source: filedata.exeBinary or memory string: OriginalFilenamePEACPSImport.exe: vs filedata.exe
Source: filedata.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\filedata.exeMutant created: NULL
Source: filedata.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: filedata.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
Source: C:\Users\user\Desktop\filedata.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\filedata.exeFile read: C:\Users\user\Desktop\filedata.exeJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\filedata.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: filedata.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: filedata.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: filedata.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\DevRepos\ProfessionalServices\PEAC\Projects\Custom\PSImport\obj\Debug\PEACPSImport.pdb source: filedata.exe
Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.pdb source: filedata.exe, 00000000.00000002.3279089458.0000000000B32000.00000004.00000020.00020000.00000000.sdmp
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_0102E732 push eax; ret 0_2_0102E739
Source: C:\Users\user\Desktop\filedata.exeCode function: 0_2_071E64C0 push eax; iretd 0_2_071E6511
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\filedata.exeMemory allocated: FB0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\filedata.exeMemory allocated: 2960000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\filedata.exeMemory allocated: 4960000 memory reserve | memory write watchJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\filedata.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Users\user\Desktop\filedata.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Runtime.Remoting\v4.0_4.0.0.0__b77a5c561934e089\System.Runtime.Remoting.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\filedata.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
1
Input Capture
1
Virtualization/Sandbox Evasion
Remote Services1
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory13
System Information Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
filedata.exe100%AviraTR/Spy.Gen5
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://www.archivesystems.com/0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefiledata.exe, 00000000.00000002.3279996737.0000000002961000.00000004.00000800.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
http://www.archivesystems.com/filedata.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467815
Start date and time:2024-07-04 20:14:55 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 6s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:filedata.exe
(renamed file extension from none to exe)
Original Sample Name:filedata
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 99%
  • Number of executed functions: 43
  • Number of non-executed functions: 4
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • VT rate limit hit for: filedata.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.491640943769623
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
  • Win32 Executable (generic) a (10002005/4) 49.75%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Windows Screen Saver (13104/52) 0.07%
  • Generic Win/DOS Executable (2004/3) 0.01%
File name:filedata.exe
File size:52'736 bytes
MD5:7794b42506387d60de24b9c86dc835ee
SHA1:ef90fd11ba251cc7390993e7fb06627e1e35696c
SHA256:fa341b1799bc1f666359ed075ef1873b3482ab24d9d6de7f2ec6b70b9faad717
SHA512:61652ff66159a8ca896387f753464b2682005c7fb0d06e2750b8cc51270970e6c7d6f433b237c6320bb20d0fcaa56770b2411e96b8173d84ea9a349a13442ca9
SSDEEP:1536:6lefR7lFwtXkLEGa/57bM+wwx4QU3DNZ35zNy0p8s:6gfNlFekIGa/9Q+wwxfU3DNZ35x
TLSH:4B33E601B7F84122F5BFAFF95DB195004BB9B9579A32C70C0A81A09E2E77B41C960B77
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......f..............P.................. ........@.. .......................@............`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x40e51e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x6685FA8A [Thu Jul 4 01:27:38 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0xe4cc0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x3e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0xe3940x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000xc5240xc6004d57dd99e1aa7b6d0f6818be39fdb724False0.4157986111111111data5.583386809314627IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x100000x3e80x400cb02860e29ff43e5bb56d55451bfe5e6False0.396484375data3.1531338705843135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x120000xc0x20058ea253d3ad4b9c98bd4b7d8a39c1b6cFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x100580x38cPGP symmetric key encrypted data - Plaintext or unencrypted data0.41629955947136565
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:14:15:45
Start date:04/07/2024
Path:C:\Users\user\Desktop\filedata.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\filedata.exe"
Imagebase:0x640000
File size:52'736 bytes
MD5 hash:7794B42506387D60DE24B9C86DC835EE
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:7.9%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:4.9%
    Total number of Nodes:163
    Total number of Limit Nodes:15
    execution_graph 50689 71e4b5e 50692 71e46e4 50689->50692 50693 71e46ef 50692->50693 50697 71e5372 50693->50697 50701 71e5380 50693->50701 50694 71e4b6b 50698 71e53cf 50697->50698 50705 71e47ec 50698->50705 50702 71e53cf 50701->50702 50703 71e47ec EnumThreadWindows 50702->50703 50704 71e5450 50703->50704 50704->50694 50706 71e5470 EnumThreadWindows 50705->50706 50708 71e5450 50706->50708 50708->50694 50709 1027848 50710 1027831 50709->50710 50713 102784b 50709->50713 50711 10277bf DuplicateHandle 50710->50711 50712 102781e 50710->50712 50711->50712 50714 1026d58 50715 1026d68 50714->50715 50716 1026d79 50715->50716 50719 1026db7 50715->50719 50724 1026e7f 50715->50724 50720 1026df2 50719->50720 50721 1026ee9 50720->50721 50729 1027020 50720->50729 50733 1027011 50720->50733 50721->50716 50725 1026e84 50724->50725 50726 1026ee9 50725->50726 50727 1027020 6 API calls 50725->50727 50728 1027011 6 API calls 50725->50728 50726->50716 50727->50726 50728->50726 50730 102702d 50729->50730 50731 1027067 50730->50731 50737 1026a90 50730->50737 50731->50721 50734 1027020 50733->50734 50735 1026a90 6 API calls 50734->50735 50736 1027067 50734->50736 50735->50736 50736->50721 50738 1026a95 50737->50738 50740 1027d80 50738->50740 50741 1027204 50738->50741 50740->50740 50742 102720f 50741->50742 50754 102b340 50742->50754 50764 102b544 50742->50764 50770 102b330 50742->50770 50743 1027dfe 50744 1027234 LoadLibraryExW CreateWindowExW GetModuleHandleW 50743->50744 50745 1027e18 50744->50745 50746 1027244 LoadLibraryExW CreateWindowExW GetModuleHandleW 50745->50746 50747 1027e1f 50746->50747 50749 102d120 LoadLibraryExW CreateWindowExW GetModuleHandleW 50747->50749 50750 102d108 LoadLibraryExW CreateWindowExW GetModuleHandleW 50747->50750 50748 1027e29 50748->50740 50749->50748 50750->50748 50755 102b36e 50754->50755 50757 102b397 50755->50757 50788 102a0a4 GetFocus 50755->50788 50758 102b43a KiUserCallbackDispatcher 50757->50758 50760 102b566 50757->50760 50758->50760 50759 102b677 50760->50759 50780 102bfe8 50760->50780 50784 102bff8 50760->50784 50761 102b64a 50761->50761 50766 102b561 50764->50766 50765 102b677 50766->50765 50768 102bfe8 3 API calls 50766->50768 50769 102bff8 3 API calls 50766->50769 50767 102b64a 50767->50767 50768->50767 50769->50767 50771 102b33a 50770->50771 50773 102b397 50771->50773 50835 102a0a4 GetFocus 50771->50835 50774 102b43a KiUserCallbackDispatcher 50773->50774 50776 102b566 50773->50776 50774->50776 50775 102b677 50776->50775 50778 102bfe8 3 API calls 50776->50778 50779 102bff8 3 API calls 50776->50779 50777 102b64a 50777->50777 50778->50777 50779->50777 50781 102bff8 50780->50781 50783 102c059 50781->50783 50789 1027244 50781->50789 50783->50761 50785 102c015 50784->50785 50786 1027244 3 API calls 50785->50786 50787 102c059 50785->50787 50786->50787 50787->50761 50788->50757 50790 102724f 50789->50790 50793 102c29c 50790->50793 50792 102cf4f 50792->50783 50794 102c2a7 50793->50794 50795 102d0c1 50794->50795 50796 102d022 50794->50796 50800 102d120 50794->50800 50809 102d108 50794->50809 50795->50792 50796->50795 50797 102c29c 3 API calls 50796->50797 50797->50796 50802 102d151 50800->50802 50803 102d252 50800->50803 50801 102d15d 50801->50796 50802->50801 50818 102d488 50802->50818 50821 102d479 50802->50821 50803->50796 50804 102d19e 50804->50803 50825 102e797 50804->50825 50830 102e7a8 50804->50830 50810 102d0ce 50809->50810 50812 102d116 50809->50812 50810->50796 50811 102d15d 50811->50796 50812->50811 50816 102d488 2 API calls 50812->50816 50817 102d479 2 API calls 50812->50817 50813 102d19e 50813->50811 50814 102e797 CreateWindowExW 50813->50814 50815 102e7a8 CreateWindowExW 50813->50815 50814->50811 50815->50811 50816->50813 50817->50813 50820 102d4c8 LoadLibraryExW GetModuleHandleW 50818->50820 50819 102d492 50819->50804 50820->50819 50822 102d488 50821->50822 50824 102d4c8 LoadLibraryExW GetModuleHandleW 50822->50824 50823 102d492 50823->50804 50824->50823 50826 102e7a7 50825->50826 50827 102e73d 50826->50827 50828 102f650 CreateWindowExW 50826->50828 50829 102f680 CreateWindowExW 50826->50829 50827->50803 50828->50827 50829->50827 50831 102e7d3 50830->50831 50832 102e882 50831->50832 50833 102f650 CreateWindowExW 50831->50833 50834 102f680 CreateWindowExW 50831->50834 50833->50832 50834->50832 50835->50773 50836 102fce8 50839 102f6ec 50836->50839 50840 102fd18 SetWindowLongW 50839->50840 50841 102fd00 50840->50841 50663 71e5b00 50664 71e5b10 50663->50664 50668 71e5b38 SendMessageW 50664->50668 50670 71e5b30 50664->50670 50665 71e5b21 50669 71e5ba4 50668->50669 50669->50665 50671 71e5b38 SendMessageW 50670->50671 50672 71e5ba4 50671->50672 50672->50665 50673 71ee0b0 50677 71ee115 50673->50677 50674 71ed2a0 PeekMessageW 50674->50677 50677->50674 50678 71ee162 50677->50678 50679 71ed2b8 50677->50679 50682 71ed2ec 50677->50682 50680 71eea18 KiUserCallbackDispatcher 50679->50680 50681 71eea8c 50680->50681 50681->50677 50683 71eeee8 DispatchMessageW 50682->50683 50684 71eef54 50683->50684 50684->50677 50685 71e3f20 50686 71e3f8b 50685->50686 50688 71e408c 50685->50688 50687 71e404a GetCapture 50686->50687 50686->50688 50687->50688 50842 71e4af0 50846 71e4bab 50842->50846 50851 71e4bc0 50842->50851 50843 71e4b21 50848 71e4bc0 50846->50848 50847 71e4bf1 50847->50843 50848->50847 50857 71e4764 50848->50857 50850 71e4c14 50852 71e4ec8 50851->50852 50853 71e4be8 50851->50853 50852->50843 50854 71e4bf1 50853->50854 50855 71e4764 OleInitialize 50853->50855 50854->50843 50856 71e4c14 50855->50856 50858 71e476f 50857->50858 50859 71e4f0b 50858->50859 50861 71e4780 50858->50861 50859->50850 50862 71e4f40 OleInitialize 50861->50862 50863 71e4fa4 50862->50863 50863->50859

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 537 71e3f20-71e3f85 538 71e446d-71e44d6 537->538 539 71e3f8b-71e3f98 537->539 543 71e44dd-71e4534 538->543 542 71e3f9e-71e3fa8 539->542 539->543 547 71e3fae-71e3fb8 542->547 548 71e453b-71e4592 542->548 543->548 550 71e3fbe-71e3fc8 547->550 551 71e4599-71e45f0 547->551 548->551 553 71e3fce-71e3fd5 550->553 554 71e45f7-71e4654 550->554 551->554 563 71e465b-71e46b8 553->563 564 71e3fdb-71e3fdf 553->564 554->563 567 71e4036-71e408a GetCapture 564->567 568 71e3fe1-71e4016 564->568 589 71e408c-71e4092 567->589 590 71e4093-71e40a1 567->590 568->567 592 71e4018-71e4027 568->592 589->590 594 71e40cd-71e4102 590->594 595 71e40a3-71e40c8 call 71e1c04 590->595 592->567 605 71e4029-71e4033 call 71e1bf4 592->605 608 71e410b-71e411c 594->608 609 71e4104-71e410a 594->609 595->594 605->567 615 71e411e-71e4129 608->615 616 71e412b 608->616 609->608 619 71e412e-71e4160 615->619 616->619 624 71e4175-71e4198 619->624 625 71e4162-71e4168 619->625 630 71e419e-71e41a8 624->630 631 71e4260-71e426a 624->631 625->624 626 71e416a-71e4170 call 71e1c10 625->626 626->624 630->631 636 71e41ae-71e41e1 630->636 632 71e426c-71e426f call 71e4a98 631->632 633 71e4275-71e4298 call 71e1b58 631->633 632->633 640 71e429a-71e429d 633->640 641 71e42a0-71e42ae call 71e1b58 633->641 647 71e41e7-71e4256 636->647 648 71e43b3-71e4443 call 71e1c10 636->648 640->641 645 71e42e4-71e42f2 call 71e1b58 641->645 646 71e42b0-71e42be 641->646 655 71e42f4-71e4302 645->655 656 71e4310-71e4330 645->656 646->645 654 71e42c0-71e42e2 call 71e1c20 646->654 647->631 648->538 654->656 655->656 664 71e4304-71e430a 655->664 669 71e4385-71e4395 656->669 670 71e4332-71e433c 656->670 664->656 666 71e430b call 71e1c20 664->666 666->656 669->648 674 71e433e-71e4351 call 71e1c2c 670->674 675 71e437a-71e437f 670->675 674->675 682 71e4353-71e4375 call 71e1c3c 674->682 694 71e4382 call 995fe44 675->694 695 71e4382 call 995fbb8 675->695 696 71e4382 call 995fbc8 675->696 682->675 694->669 695->669 696->669
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: Capture
    • String ID: Hgq$Hgq
    • API String ID: 1145282425-3391890871
    • Opcode ID: 9929b77b57197ac227336c700bbd32037f75bf1917a5ae06381180c6d4c5fb71
    • Instruction ID: 4476445f270289d87e5b054cf1925aba5d1d826e6682e0974eb9e947ffafaee7
    • Opcode Fuzzy Hash: 9929b77b57197ac227336c700bbd32037f75bf1917a5ae06381180c6d4c5fb71
    • Instruction Fuzzy Hash: B51271B0B002599FDB15EFB9C5506AEBBF6AFC8300F248569E409AB391DF349D42CB51

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 817 71e3f10-71e3f1c 818 71e3f1e-71e3f85 817->818 819 71e3eb1-71e3ebc 817->819 821 71e446d-71e44d6 818->821 822 71e3f8b-71e3f98 818->822 826 71e44dd-71e4534 821->826 825 71e3f9e-71e3fa8 822->825 822->826 830 71e3fae-71e3fb8 825->830 831 71e453b-71e4592 825->831 826->831 833 71e3fbe-71e3fc8 830->833 834 71e4599-71e45f0 830->834 831->834 836 71e3fce-71e3fd5 833->836 837 71e45f7-71e4654 833->837 834->837 846 71e465b-71e46b8 836->846 847 71e3fdb-71e3fdf 836->847 837->846 850 71e4036-71e408a GetCapture 847->850 851 71e3fe1-71e4016 847->851 872 71e408c-71e4092 850->872 873 71e4093-71e40a1 850->873 851->850 875 71e4018-71e4027 851->875 872->873 877 71e40cd-71e4102 873->877 878 71e40a3-71e40c8 call 71e1c04 873->878 875->850 888 71e4029-71e4033 call 71e1bf4 875->888 891 71e410b-71e411c 877->891 892 71e4104-71e410a 877->892 878->877 888->850 898 71e411e-71e4129 891->898 899 71e412b 891->899 892->891 902 71e412e-71e4160 898->902 899->902 907 71e4175-71e4198 902->907 908 71e4162-71e4168 902->908 913 71e419e-71e41a8 907->913 914 71e4260-71e426a 907->914 908->907 909 71e416a-71e4170 call 71e1c10 908->909 909->907 913->914 919 71e41ae-71e41e1 913->919 915 71e426c-71e426f call 71e4a98 914->915 916 71e4275-71e4298 call 71e1b58 914->916 915->916 923 71e429a-71e429d 916->923 924 71e42a0-71e42ae call 71e1b58 916->924 930 71e41e7-71e4256 919->930 931 71e43b3-71e4443 call 71e1c10 919->931 923->924 928 71e42e4-71e42f2 call 71e1b58 924->928 929 71e42b0-71e42be 924->929 938 71e42f4-71e4302 928->938 939 71e4310-71e4317 928->939 929->928 937 71e42c0-71e42e2 call 71e1c20 929->937 930->914 931->821 937->939 938->939 947 71e4304-71e430a 938->947 945 71e4320-71e4330 939->945 952 71e4385-71e4395 945->952 953 71e4332-71e433c 945->953 947->939 949 71e430b call 71e1c20 947->949 949->939 952->931 957 71e433e-71e4351 call 71e1c2c 953->957 958 71e437a-71e437f 953->958 957->958 965 71e4353-71e4375 call 71e1c3c 957->965 977 71e4382 call 995fe44 958->977 978 71e4382 call 995fbb8 958->978 979 71e4382 call 995fbc8 958->979 965->958 977->952 978->952 979->952
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: Capture
    • String ID: ]
    • API String ID: 1145282425-3352871620
    • Opcode ID: 1ca19c02f49bc2e803b836264e11e718cc163c9a1e00b93210e4bcd48cc43940
    • Instruction ID: 2e01daf126343369e42136c08f947224564686683425c93d95ea2c875d3816b3
    • Opcode Fuzzy Hash: 1ca19c02f49bc2e803b836264e11e718cc163c9a1e00b93210e4bcd48cc43940
    • Instruction Fuzzy Hash: BEE13FB4E00659CFDB25DFB5C944A9DBBF5FF89300F248269E505AB2A1DB31A981CF10

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1141 9956ca0-9956dc7 call 99554c0 1147 9956dcd-9956e99 1141->1147 1148 9956e9e-9956ea8 1141->1148 1158 99571d7-99571e3 1147->1158 1149 9957045-99571cb 1148->1149 1150 9956eae-9957040 1148->1150 1149->1158 1150->1158 1161 99571e5-99571ec 1158->1161 1162 9957218-9957241 1158->1162 1163 99571f5-99571fc 1161->1163 1164 99571ee-99571f3 1161->1164 1165 99572b4-9957309 1162->1165 1169 9957202-9957211 1163->1169 1170 99571fe-9957200 1163->1170 1168 9957214-9957216 1164->1168 1178 9957314-99573a7 1165->1178 1179 995730b 1165->1179 1168->1162 1172 9957243-99572ad 1168->1172 1169->1168 1170->1168 1172->1165 1189 99573b2-9957426 1178->1189 1190 99573a9 1178->1190 1179->1178 1180 995730d 1179->1180 1180->1178 1199 99574e1-9957517 1189->1199 1200 995742c-99574d1 call 99554c0 1189->1200 1190->1189 1191 99573ab 1190->1191 1191->1189 1207 9957519 1199->1207 1208 995752b-9957538 1199->1208 1200->1199 1204 99574d3-99574e0 1200->1204 1204->1199 1207->1208 1209 995751b-9957529 1207->1209 1212 9957539-9957543 1208->1212 1209->1212 1213 9957545-995755d 1212->1213 1214 99575b3-99575c3 1212->1214 1217 99575c4-99575d5 1213->1217 1218 995755f-9957566 1213->1218 1214->1217 1243 99575d7 call 71eb8f0 1217->1243 1244 99575d7 call 71eb8e0 1217->1244 1219 995756f-9957576 1218->1219 1220 9957568-995756d 1218->1220 1223 995757c-995758b 1219->1223 1224 9957578-995757a 1219->1224 1222 995758e-9957590 1220->1222 1222->1217 1225 9957592-99575b1 1222->1225 1223->1222 1224->1222 1225->1217 1227 99575dc-9957724 1241 9957726 1227->1241 1242 9957732 1227->1242 1241->1242 1243->1227 1244->1227
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3281096867.0000000009950000.00000040.00000800.00020000.00000000.sdmp, Offset: 09950000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9950000_filedata.jbxd
    Similarity
    • API ID:
    • String ID: fff?
    • API String ID: 0-4136771917
    • Opcode ID: 665c1400b401984e158c5caa2b7ad346b106b09084b7d157d4c1c0a04bd1d8c3
    • Instruction ID: eff0c9e161d3948152e28eec0956ede83d1eec9b0f774ad15f707dc2055030a8
    • Opcode Fuzzy Hash: 665c1400b401984e158c5caa2b7ad346b106b09084b7d157d4c1c0a04bd1d8c3
    • Instruction Fuzzy Hash: F4624A35800A1ADFCF11CFA0C884AD9B7B2FF99304F1586D5E9096B125EB71AAD5CF80
    Memory Dump Source
    • Source File: 00000000.00000002.3281096867.0000000009950000.00000040.00000800.00020000.00000000.sdmp, Offset: 09950000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9950000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 64c4f43c8ea4293d9bc3a007c0a68f844ad31acb5b8bef6f2a2d17e82b803e94
    • Instruction ID: f7e3fc1b48e67d50659f23e3c3e886f1396b88fee16564e6322af87aeb69d5ec
    • Opcode Fuzzy Hash: 64c4f43c8ea4293d9bc3a007c0a68f844ad31acb5b8bef6f2a2d17e82b803e94
    • Instruction Fuzzy Hash: C8523935910619CFCB21DF64C844BEAB7B5FF89300F1585D9E84AAB261EB31EA81CF41
    Memory Dump Source
    • Source File: 00000000.00000002.3281096867.0000000009950000.00000040.00000800.00020000.00000000.sdmp, Offset: 09950000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9950000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: db36e35e5540fa0bde63f615228658817ae13e601e823bd31368c93205e76618
    • Instruction ID: 83aa2c52a25cd6b12451eebda5f8be636c77deb65b10ecad8cde4b461d78b216
    • Opcode Fuzzy Hash: db36e35e5540fa0bde63f615228658817ae13e601e823bd31368c93205e76618
    • Instruction Fuzzy Hash: 83322931900619CFDB21DF64C944BDAB7B2FF89300F5585E9E84EAB261DB71AA85CF40
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: DispatchMessage
    • String ID:
    • API String ID: 2061451462-0
    • Opcode ID: af9b77820d719ac14eb3f5d5566a41569591f177f72f29f503f1d6c7677289ea
    • Instruction ID: f6ded71244302d9e0be10f3292272f72585c69b90e5a01d8506c34699405867a
    • Opcode Fuzzy Hash: af9b77820d719ac14eb3f5d5566a41569591f177f72f29f503f1d6c7677289ea
    • Instruction Fuzzy Hash: 0EF16CB4A0060ACFEB14DFA9C844B9DBBF5FF48304F158569E409AB3A1DB70E949CB51
    Memory Dump Source
    • Source File: 00000000.00000002.3281144805.0000000009980000.00000040.00000800.00020000.00000000.sdmp, Offset: 09980000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9980000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d947d42c04985f1ff8a98188023edfc52f31221d805dc80ba1bedbae61e37540
    • Instruction ID: a45d6129ef49faec01825ca2a8ba06bedec8f1f9abc58b8624acc743713227ad
    • Opcode Fuzzy Hash: d947d42c04985f1ff8a98188023edfc52f31221d805dc80ba1bedbae61e37540
    • Instruction Fuzzy Hash: 6BD1AA707046118FEB29EB75C450BAF77EAAF89700F14446EE186DB6A1DB35E802CB51

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1245 102d4c8-102d4e7 1246 102d513-102d517 1245->1246 1247 102d4e9-102d4f6 call 102c374 1245->1247 1249 102d52b-102d56c 1246->1249 1250 102d519-102d523 1246->1250 1252 102d4f8 1247->1252 1253 102d50c 1247->1253 1256 102d579-102d587 1249->1256 1257 102d56e-102d576 1249->1257 1250->1249 1301 102d4fe call 102d770 1252->1301 1302 102d4fe call 102d761 1252->1302 1253->1246 1258 102d5ab-102d5ad 1256->1258 1259 102d589-102d58e 1256->1259 1257->1256 1264 102d5b0-102d5b7 1258->1264 1261 102d590-102d597 call 102c380 1259->1261 1262 102d599 1259->1262 1260 102d504-102d506 1260->1253 1263 102d648-102d708 1260->1263 1266 102d59b-102d5a9 1261->1266 1262->1266 1296 102d710-102d73b GetModuleHandleW 1263->1296 1297 102d70a-102d70d 1263->1297 1267 102d5c4-102d5cb 1264->1267 1268 102d5b9-102d5c1 1264->1268 1266->1264 1270 102d5d8-102d5e1 call 102c390 1267->1270 1271 102d5cd-102d5d5 1267->1271 1268->1267 1276 102d5e3-102d5eb 1270->1276 1277 102d5ee-102d5f3 1270->1277 1271->1270 1276->1277 1278 102d611-102d615 1277->1278 1279 102d5f5-102d5fc 1277->1279 1303 102d618 call 102da50 1278->1303 1304 102d618 call 102da41 1278->1304 1279->1278 1281 102d5fe-102d60e call 102c148 call 102c3a0 1279->1281 1281->1278 1284 102d61b-102d61e 1286 102d620-102d63e 1284->1286 1287 102d641-102d647 1284->1287 1286->1287 1298 102d744-102d758 1296->1298 1299 102d73d-102d743 1296->1299 1297->1296 1299->1298 1301->1260 1302->1260 1303->1284 1304->1284
    APIs
    • GetModuleHandleW.KERNELBASE(00000000), ref: 0102D72E
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: HandleModule
    • String ID:
    • API String ID: 4139908857-0
    • Opcode ID: cf3deba1873387412254f2ff25021b47deee885b2f9c92c3b76be79a47d2c11a
    • Instruction ID: cc34891836959f5cd8dbc092ae588f688a17b7c1e3af44c18b918c8120f06590
    • Opcode Fuzzy Hash: cf3deba1873387412254f2ff25021b47deee885b2f9c92c3b76be79a47d2c11a
    • Instruction Fuzzy Hash: 5D8166B0A00B158FE764DF6AD44479ABBF1FF88304F10896DD48AD7A40E775E949CB90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1305 102c53c-102fb36 1307 102fb41-102fb48 1305->1307 1308 102fb38-102fb3e 1305->1308 1309 102fb53-102fbf2 CreateWindowExW 1307->1309 1310 102fb4a-102fb50 1307->1310 1308->1307 1312 102fbf4-102fbfa 1309->1312 1313 102fbfb-102fc33 1309->1313 1310->1309 1312->1313 1317 102fc40 1313->1317 1318 102fc35-102fc38 1313->1318 1318->1317
    APIs
    • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0102FBE2
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: CreateWindow
    • String ID:
    • API String ID: 716092398-0
    • Opcode ID: 8442d49a3ada27b6672556814be0ba451c1697c9fe442d17346d225e93e69b70
    • Instruction ID: a384f9cdfea19f8d4d76af1e734ba0964a3a61516729c3fb57cfbe6dba1f40e8
    • Opcode Fuzzy Hash: 8442d49a3ada27b6672556814be0ba451c1697c9fe442d17346d225e93e69b70
    • Instruction Fuzzy Hash: 1351BDB1D0035A9FDB14CF9AC994ADEBBB5FF48350F24812AE819AB210D774A845CF90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 1319 1027848-1027849 1320 1027831-1027832 1319->1320 1321 102784b-1027976 1319->1321 1322 1027833-1027842 1320->1322 1323 10277bf-102781c DuplicateHandle 1320->1323 1325 1027825-102782c 1323->1325 1326 102781e-1027824 1323->1326 1325->1322 1326->1325
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 7ff1b489fbe61fac01b511e4eec512694099f18db327ca3015513ae6a0a60af0
    • Instruction ID: e51fb29396f41bd817477ed3e3aa96fedcfa8050a76ca6a168eed6323d8f5f28
    • Opcode Fuzzy Hash: 7ff1b489fbe61fac01b511e4eec512694099f18db327ca3015513ae6a0a60af0
    • Instruction Fuzzy Hash: E241A2B49043048FE704DF61E554A6A3BF9FB89701F248029EA859B388CB795C01CF22
    APIs
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0102780F
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 0d40dc3581d65c9374b6f474381f61ca74034eddcba12940b6b0c504d34de0f3
    • Instruction ID: 3910fb7c5ab9df706ffc59fd132b1f0e0fad8869380822a7a7746589124de709
    • Opcode Fuzzy Hash: 0d40dc3581d65c9374b6f474381f61ca74034eddcba12940b6b0c504d34de0f3
    • Instruction Fuzzy Hash: 3A21E5B5D002599FDB10CFAAD884ADEBFF9EB48310F14841AE958A3350D378A954CF65
    APIs
    • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E20,?,?,071E5450,039642B4,029AB100), ref: 071E54E1
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: EnumThreadWindows
    • String ID:
    • API String ID: 2941952884-0
    • Opcode ID: 64673144f49a7d62d8d78614fdee4ac13c8fde8f7ef8b60af7497264081a5dd9
    • Instruction ID: d3473f52b7e21cc98d9ba85388fb36bda2506f37a7f29c356fa90e9b508ad5df
    • Opcode Fuzzy Hash: 64673144f49a7d62d8d78614fdee4ac13c8fde8f7ef8b60af7497264081a5dd9
    • Instruction Fuzzy Hash: 71214CB1D0020A8FDB10CF9AC848BEEFBF9EB88314F10842AD454A7250D778A944CFA5
    APIs
    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0102780F
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: DuplicateHandle
    • String ID:
    • API String ID: 3793708945-0
    • Opcode ID: 0405ad63bfcff435c84a30eddc3d424fd13c2fcdb0be34f53560d45cada4a379
    • Instruction ID: 18001a9c7ad52d04e686b3d0ef03273fc6f52603c02ef7734ae147dbb73de2c9
    • Opcode Fuzzy Hash: 0405ad63bfcff435c84a30eddc3d424fd13c2fcdb0be34f53560d45cada4a379
    • Instruction Fuzzy Hash: 9F21E3B5D002599FDB10CFAAD884ADEBBF8EB48310F14841AE958A3210D374A944CFA1
    APIs
    • EnumThreadWindows.USER32(?,00000000,?,?,?,?,00000E20,?,?,071E5450,039642B4,029AB100), ref: 071E54E1
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: EnumThreadWindows
    • String ID:
    • API String ID: 2941952884-0
    • Opcode ID: e57c75a225bdf9aac007cd147c4d55cb2f7e7384ad30d5d670ec211d66c57da4
    • Instruction ID: 15e5c00a7745cf9a68a2f0e154ad906e6719d4d708870a8d4202d438414d9d56
    • Opcode Fuzzy Hash: e57c75a225bdf9aac007cd147c4d55cb2f7e7384ad30d5d670ec211d66c57da4
    • Instruction Fuzzy Hash: 55214CB1D0024A8FDB10CF9AC848BEEFBF9EB88310F14842AD454A7250D778A944CF61
    APIs
    • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,071EE292,00000000,00000000,039642B4,029AB100), ref: 071EE6E0
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: MessagePeek
    • String ID:
    • API String ID: 2222842502-0
    • Opcode ID: 60d85799ade86d9ef8cc03e8f59fe00f4c0a303b26b5d9b0dd415c90beeea625
    • Instruction ID: c00efe83fbe2dca51c1b5a4408e4513b6b65c8a46b16ca66e816262984438aff
    • Opcode Fuzzy Hash: 60d85799ade86d9ef8cc03e8f59fe00f4c0a303b26b5d9b0dd415c90beeea625
    • Instruction Fuzzy Hash: 3C1117B5C00259DFDB10CF9AD544BDEBBF8FB48310F10842AE958A3250D378A944CFA5
    APIs
    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0102D7A9,00000800,00000000,00000000), ref: 0102D9BA
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 1482c21f816d257a992b7f3c58ad2fbce85d57f4f24a5535a07161aaa45ad7d2
    • Instruction ID: bb4c0dd768e5ea092a8ddf2788560e32e95cfb9ca1eabe7ae019c97d1e6adab5
    • Opcode Fuzzy Hash: 1482c21f816d257a992b7f3c58ad2fbce85d57f4f24a5535a07161aaa45ad7d2
    • Instruction Fuzzy Hash: 241114B6D003198FDB10CF9AD448ADEFBF5EB88310F10842EE559A7200C375A945CFA5
    APIs
    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0102D7A9,00000800,00000000,00000000), ref: 0102D9BA
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: LibraryLoad
    • String ID:
    • API String ID: 1029625771-0
    • Opcode ID: 2d006e8efde1e9534cb071982bc11b9d3a80b00346d421666387c949d1f48bbb
    • Instruction ID: 09ec8a24fa2970b173ddde92280215f84886a4985c30db16c1cef67aa3104e20
    • Opcode Fuzzy Hash: 2d006e8efde1e9534cb071982bc11b9d3a80b00346d421666387c949d1f48bbb
    • Instruction Fuzzy Hash: 711103B6D003498FDB10CFAAD444A9EFBF5AB48310F10842EE959A7300C375A945CFA5
    APIs
    • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,071EE292,00000000,00000000,039642B4,029AB100), ref: 071EE6E0
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: MessagePeek
    • String ID:
    • API String ID: 2222842502-0
    • Opcode ID: 2e9392afdba015968a812ad28b0f2f45bc476b1ec80e0ba35890febbc0e7b603
    • Instruction ID: 860e614fabb3ac7cd975d5599f194cba21ba90058c7055b5bc407738648f07ac
    • Opcode Fuzzy Hash: 2e9392afdba015968a812ad28b0f2f45bc476b1ec80e0ba35890febbc0e7b603
    • Instruction Fuzzy Hash: 3511E4B5C0025A9FDB10CF9AD944BDEBBF8EB48320F10842AE958A3250D378A545DFA5
    APIs
    • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,071EE31F,00000000,039642B4,029AB100,00000000,?), ref: 071EEA7D
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: CallbackDispatcherUser
    • String ID:
    • API String ID: 2492992576-0
    • Opcode ID: 708503da191d1ab7b40dc08df92f824c22dd45ef638e3927decd6e6f5d5485f4
    • Instruction ID: c21d904c5c7a75e481bba9f4eccbe1959653aa47c97f4519f3303c8026ee7c3b
    • Opcode Fuzzy Hash: 708503da191d1ab7b40dc08df92f824c22dd45ef638e3927decd6e6f5d5485f4
    • Instruction Fuzzy Hash: 2611D3B5C047499FDB10DF9AD844BDEBBF8FB48310F10846AE958A3251D378A948CFA5
    APIs
    • KiUserCallbackDispatcher.NTDLL(?,?,00000000,00000000,?,?,?,071EE31F,00000000,039642B4,029AB100,00000000,?), ref: 071EEA7D
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: CallbackDispatcherUser
    • String ID:
    • API String ID: 2492992576-0
    • Opcode ID: 8ffcdf77389ff45c92f5b064f2eece072cbd13747a1716c754f95d724ddbb64b
    • Instruction ID: 8d5b48eeda9736429e5bba112af24723248088474d91febaa8cb65fbfb614283
    • Opcode Fuzzy Hash: 8ffcdf77389ff45c92f5b064f2eece072cbd13747a1716c754f95d724ddbb64b
    • Instruction Fuzzy Hash: 421114B5C003499FDB10CF9AD884BDEFBF8EB48310F10842AE418A3240D378A649CFA5
    APIs
    • SendMessageW.USER32(?,?,?,?), ref: 071E5B95
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 8d2c15dad4c09d8832babf95b57dbbd43376a3fd37766e42a23761aa242fb340
    • Instruction ID: 3240d67c5215fe1fb73f0b35091377060ec304faafcd35964caed127a4b3f09b
    • Opcode Fuzzy Hash: 8d2c15dad4c09d8832babf95b57dbbd43376a3fd37766e42a23761aa242fb340
    • Instruction Fuzzy Hash: 2311F2B58003499FCB10CF9AD989BDEBBF8EB48324F14841AE958A7241D379A544CFA1
    APIs
    • GetModuleHandleW.KERNELBASE(00000000), ref: 0102D72E
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: HandleModule
    • String ID:
    • API String ID: 4139908857-0
    • Opcode ID: b895a45694c0a175ec216cab77bd2563feb350c2e86f2ca0d3a309cca075ea38
    • Instruction ID: f3b985d44f0357bf5ef3c3cc1ebad8d78fb8072fdb410e48a1f958a07e9c6965
    • Opcode Fuzzy Hash: b895a45694c0a175ec216cab77bd2563feb350c2e86f2ca0d3a309cca075ea38
    • Instruction Fuzzy Hash: 6411E0B5C00359CFDB10CF9AD448ADEFBF9EB88314F10846AD559A7210D379A545CFA1
    APIs
    • SetWindowLongW.USER32(?,?,?,?,?,?,?,?,0102FD00,?,?,?,?), ref: 0102FD75
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID: LongWindow
    • String ID:
    • API String ID: 1378638983-0
    • Opcode ID: 5138eb68c8a65bc5f1ad2bc6ac2e4fd7eabd886f893f33ec7b354e11e08dc51b
    • Instruction ID: 73942ee8393a2917b66d59de81dd1a5eca673b63d936eff923c2082100c9dc11
    • Opcode Fuzzy Hash: 5138eb68c8a65bc5f1ad2bc6ac2e4fd7eabd886f893f33ec7b354e11e08dc51b
    • Instruction Fuzzy Hash: 5511F5B5800259DFDB10DF9AD449B9EBBF8EB48310F10845AE959A7210C374A944CFA1
    APIs
    • OleInitialize.OLE32(00000000), ref: 071E4F95
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: Initialize
    • String ID:
    • API String ID: 2538663250-0
    • Opcode ID: 993d843950ce19e93ed04ec5f54a1ef1972f9c70393448466a0b41512021c1df
    • Instruction ID: 55c2b2eea5a2e074bd3420e7347e4a8227a3c47adff34613bc1d633d5441cae2
    • Opcode Fuzzy Hash: 993d843950ce19e93ed04ec5f54a1ef1972f9c70393448466a0b41512021c1df
    • Instruction Fuzzy Hash: D81115B5C04749CFCB20DF9ED449B9EBBF8EB48310F108459E519A7250D374A944CFA5
    APIs
    • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,071EE3D7), ref: 071EEF45
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: DispatchMessage
    • String ID:
    • API String ID: 2061451462-0
    • Opcode ID: 086773fb7041cd51996513a48be127bd501f7795eee840b2ca8cbb83899c4259
    • Instruction ID: db531ff5740c817ed1f77d54d39cbd5ebc799787383eedb5f2f5277259152e32
    • Opcode Fuzzy Hash: 086773fb7041cd51996513a48be127bd501f7795eee840b2ca8cbb83899c4259
    • Instruction Fuzzy Hash: 1B11FEB5C04649CFDB20DF9AD848B9EFBF8EB48310F10846AE519B7250D378A548CFA5
    APIs
    • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,071EE3D7), ref: 071EEF45
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: DispatchMessage
    • String ID:
    • API String ID: 2061451462-0
    • Opcode ID: cc6e3a503ae4ce3b1256bfbd5827da37c3a65a68c8dc53ac54fa1807009a9f59
    • Instruction ID: 3994bb3be08f488fcfd2514d8cedc6bb8e7a7fc829ce44e3a3a1ca8d05995932
    • Opcode Fuzzy Hash: cc6e3a503ae4ce3b1256bfbd5827da37c3a65a68c8dc53ac54fa1807009a9f59
    • Instruction Fuzzy Hash: E511F2B5C04649CFCB20CF9AD448BCEFBF8EB48310F10845AD419A3250D378A549CFA5
    APIs
    • OleInitialize.OLE32(00000000), ref: 071E4F95
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: Initialize
    • String ID:
    • API String ID: 2538663250-0
    • Opcode ID: 8173e4cb2035f51267961ab1ff436e21003eab1ac9fe5810439fff4a3290e70d
    • Instruction ID: 0163cc63627ac6de9036d39807ee2296c794e1f13b53754f7ef352130a4c1b57
    • Opcode Fuzzy Hash: 8173e4cb2035f51267961ab1ff436e21003eab1ac9fe5810439fff4a3290e70d
    • Instruction Fuzzy Hash: 4E1100B5C00349CFCB20DF9AD589B8EFBF8EB48324F24845AE518A7250D378A544CFA5
    APIs
    • SendMessageW.USER32(?,?,?,?), ref: 071E5B95
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID: MessageSend
    • String ID:
    • API String ID: 3850602802-0
    • Opcode ID: 4254dd71da5b5635379017c5685afb9bce52a32f7d464a6b8f503645975d2399
    • Instruction ID: 0513dda2c386176ec4ab22cfccb80cf684bd50e120f3216ec0868fe605371dd9
    • Opcode Fuzzy Hash: 4254dd71da5b5635379017c5685afb9bce52a32f7d464a6b8f503645975d2399
    • Instruction Fuzzy Hash: 7311D0B5800349DFDB10DF9AD989BDEBBF8EB48324F10881AE558A7250C375A954CFA1
    Memory Dump Source
    • Source File: 00000000.00000002.3281144805.0000000009980000.00000040.00000800.00020000.00000000.sdmp, Offset: 09980000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9980000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ab1285ef8a34d9e06f022697c1e0866fa5afeefb823cf008bdda21bdaf07b53c
    • Instruction ID: 212217ce6f63ade83adb4fbd2db8717f30fcd3d0f8c6f77410a352084feb3185
    • Opcode Fuzzy Hash: ab1285ef8a34d9e06f022697c1e0866fa5afeefb823cf008bdda21bdaf07b53c
    • Instruction Fuzzy Hash: D3C1A9707046118FDB29EB75C460BAF77EAAF89700F64446EE186CB6A1DF35E802CB51
    Memory Dump Source
    • Source File: 00000000.00000002.3281144805.0000000009980000.00000040.00000800.00020000.00000000.sdmp, Offset: 09980000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9980000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 65ea93104291d6e6cafe86f2bbf063c6473c7b795dd802851406abf87ab91108
    • Instruction ID: 1a68e5bf6c2ad9532eb812c8982f9c15355b717de9d9ca3a0c409f2fe572b5a9
    • Opcode Fuzzy Hash: 65ea93104291d6e6cafe86f2bbf063c6473c7b795dd802851406abf87ab91108
    • Instruction Fuzzy Hash: EAB189717006118FEB29EF75C460BAF77EAAF89700F64446DE186DB6A0DB35E802CB51
    Memory Dump Source
    • Source File: 00000000.00000002.3281144805.0000000009980000.00000040.00000800.00020000.00000000.sdmp, Offset: 09980000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9980000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b1841d44821ed561baa21cd6d6a8cad06b24ffc42a23fdfa86ca44a0b793cedb
    • Instruction ID: a4d771c87037fbd55c36adc0717ad3bfb877579e932b2c73da415abb526c1d1a
    • Opcode Fuzzy Hash: b1841d44821ed561baa21cd6d6a8cad06b24ffc42a23fdfa86ca44a0b793cedb
    • Instruction Fuzzy Hash: E4B17830B012049FDB14EF69D590AAEB7FAEF89700F2444A9E546DB3A1CB31ED42CB50
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 2fe4c9ae572b794a47480e42f6d2f8ec44cebcfce496e91e382d27efe4fd71b8
    • Instruction ID: c28ad576d294c1f3ea0142ae543f4292074ba62f73f444dff9d4e5a5dfa53eee
    • Opcode Fuzzy Hash: 2fe4c9ae572b794a47480e42f6d2f8ec44cebcfce496e91e382d27efe4fd71b8
    • Instruction Fuzzy Hash: 0E2106B1504200DFDB05DF94D9C4B26BF66FB99318F34856EED090B296C336D856C6B1
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ead8ef08e1c2014e9e82e38c3ab3393494e44c383ad8dcc9a46bff5dd90d9e47
    • Instruction ID: be499f5820095e6fbb38f3ec47f6a06895ed8fad13007ca9e9c340e5d2687d6c
    • Opcode Fuzzy Hash: ead8ef08e1c2014e9e82e38c3ab3393494e44c383ad8dcc9a46bff5dd90d9e47
    • Instruction Fuzzy Hash: C62125B1504204EFDB05DF94D9C0B26BF66FB94324F24C56AE94D0B286C336E816C6B1
    Memory Dump Source
    • Source File: 00000000.00000002.3279428454.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d1d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 20b2bbf868c74540b7c0cc6f4a46af28b5f14c6dd6c66e23d411278186ce279c
    • Instruction ID: 2114c70d2a54f61122334a9bd0b61df86f06b9c5e33710cbd586dc3231460d9b
    • Opcode Fuzzy Hash: 20b2bbf868c74540b7c0cc6f4a46af28b5f14c6dd6c66e23d411278186ce279c
    • Instruction Fuzzy Hash: 8821F575504240EFDB14DF14E9C4B56BB66EB88314F34C56DE84A4B286CB3AD887CA71
    Memory Dump Source
    • Source File: 00000000.00000002.3279428454.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d1d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6f3234f71ea977887f6c1e099f247fa2f9469bb2b92c2a1765e8d0b0db388b22
    • Instruction ID: d91fd1577d28ba649d3c9a64f5ce30120f187ae5c1405bb12cb0036c0bbf6741
    • Opcode Fuzzy Hash: 6f3234f71ea977887f6c1e099f247fa2f9469bb2b92c2a1765e8d0b0db388b22
    • Instruction Fuzzy Hash: 8C2149B1504204FFCB04CF54E5C0B56BB66FB84314F34C56DD8494B286CB36E886CA72
    Memory Dump Source
    • Source File: 00000000.00000002.3279428454.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d1d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: dfb99e07c538a34c5f5269a50ee98590b52dae003c8e09cb0312e7ccf94a4fc2
    • Instruction ID: f6807fc56c0802d7579d8ec4daae99572bc152e929fecfd2ddfbc3e9be450727
    • Opcode Fuzzy Hash: dfb99e07c538a34c5f5269a50ee98590b52dae003c8e09cb0312e7ccf94a4fc2
    • Instruction Fuzzy Hash: 602195755093C09FC702CF24D594715BF71EB46314F28C5DAD8498F6A7C33A984ACB62
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
    • Instruction ID: 6ca5eeed2cc8d0681d967d91c43a4c79d041f76acb147b424bde6bf11d0158af
    • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
    • Instruction Fuzzy Hash: E611E676504240CFCB16CF54D9C4B16BF72FB95324F28C6AADD090B696C33AD85ACBA1
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
    • Instruction ID: fd7ce37f475bae56cec6965045ef8db0f948db3f65e34719c2cff39695546ae4
    • Opcode Fuzzy Hash: c71a23e6f2891b0ac880f649e89db06405e67f0af756f6891ce480dd6b8289f7
    • Instruction Fuzzy Hash: 50112672404240DFCB02CF40D9C4B16FF72FB94320F28C5AAD8090B656C33AE85ACBA1
    Memory Dump Source
    • Source File: 00000000.00000002.3279428454.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d1d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
    • Instruction ID: f140e9acd1afbd0ceb670d311b9c1d5b977eab7dc1a4fa7c41010d19406a9396
    • Opcode Fuzzy Hash: 5ecdbd2196c02b2d36a90ebf2b22d30fffd8b7da1097997a33617a95b9f44a3d
    • Instruction Fuzzy Hash: DC11D075504240DFCB01CF14E5C4B55BB72FB84314F28C6ADD8494B656C33AE84ACB61
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d6a0f7917aec63de76a6a49f9f999fce44c611f3830834011f9822402627de5d
    • Instruction ID: 81808d2b4f0e044b0bb2173e209d7669a1da56454768c48586713555c189142e
    • Opcode Fuzzy Hash: d6a0f7917aec63de76a6a49f9f999fce44c611f3830834011f9822402627de5d
    • Instruction Fuzzy Hash: 2E01A7711093409EE7109A99DDC4766BF99DF91760F2CC85BED4E0A2C6C378D844C671
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3fe74a87af246c487268749c0453e6be57762a13939e09592358c60facd93569
    • Instruction ID: bd21978b220c59871c403ec536f8fe5b9c350d2d4baa721c91e75f6e0578a1bd
    • Opcode Fuzzy Hash: 3fe74a87af246c487268749c0453e6be57762a13939e09592358c60facd93569
    • Instruction Fuzzy Hash: ADF0F9B6200644AFD720CF4AD885C27FBAEEFD4770719C55AE84A4B752C672EC41CAB0
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: e3582afa79a0154d99c03bd1b720956ad929d4cdbedcbb708ca41bbdb3089521
    • Instruction ID: a379fcf45c5863e63988bcef806a5cfddf5952f1eac424cf357783a80fd85698
    • Opcode Fuzzy Hash: e3582afa79a0154d99c03bd1b720956ad929d4cdbedcbb708ca41bbdb3089521
    • Instruction Fuzzy Hash: 30F09671404344AEE7108A1ADD84B63FFA8EF91734F18C45AED4D4B2D6C3799C44CA71
    Memory Dump Source
    • Source File: 00000000.00000002.3279366880.0000000000D0D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D0D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_d0d000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b1de8b189d8031a1298c7ddf3b292b48a01f7f9d71a3babc8ced1a1733e44baa
    • Instruction ID: f3b891472cb5ffd3edf5111fd4fda45dee44c0f7d16022c5dc1a1f3e8907971e
    • Opcode Fuzzy Hash: b1de8b189d8031a1298c7ddf3b292b48a01f7f9d71a3babc8ced1a1733e44baa
    • Instruction Fuzzy Hash: 1EF04F75104680AFD715CF56CC84C23BFB9EF85760719848AE88A4B362C631FC42CB70
    APIs
    • GetKeyState.USER32(00000001), ref: 0995D2F5
    • GetKeyState.USER32(00000002), ref: 0995D33A
    • GetKeyState.USER32(00000004), ref: 0995D37F
    • GetKeyState.USER32(00000005), ref: 0995D3C4
    • GetKeyState.USER32(00000006), ref: 0995D409
    Memory Dump Source
    • Source File: 00000000.00000002.3281096867.0000000009950000.00000040.00000800.00020000.00000000.sdmp, Offset: 09950000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_9950000_filedata.jbxd
    Similarity
    • API ID: State
    • String ID:
    • API String ID: 1649606143-0
    • Opcode ID: 220c6e31f79eda81ebbecb3efa9e0251899a30348876016e36798357a7487e6d
    • Instruction ID: eecca467a7f3f6f8d2177fb51f8cbc83dd33315d0fa5c39b4d7c78b40e768167
    • Opcode Fuzzy Hash: 220c6e31f79eda81ebbecb3efa9e0251899a30348876016e36798357a7487e6d
    • Instruction Fuzzy Hash: 614163B1C017458EDB10DF99D55C3AFBFF4AB05709F208419D48AA6290D37A568ACFA2
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: a5caf905b92bdabe27a6232d9626bc6adf7be44b15557b80f88d5867a3578fd3
    • Instruction ID: efa885c0abd38f09d17f5226579e38f4ddecded6dfed89ce62c817d21c5f614a
    • Opcode Fuzzy Hash: a5caf905b92bdabe27a6232d9626bc6adf7be44b15557b80f88d5867a3578fd3
    • Instruction Fuzzy Hash: 7FD1183182465A8ADB01EF68D99069DF771FF95300F60C79AE4493B254EF706AC5CF90
    Memory Dump Source
    • Source File: 00000000.00000002.3280945440.00000000071E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071E0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_71e0000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ff99e5d77033ac4305e8ab0debd7efb87983a8c22ed5b5c492cf0b4f04889e1e
    • Instruction ID: 0884bf59d46660e843d5745596dd7e964ddfcec9bfe1a6e8000724ac84ea128f
    • Opcode Fuzzy Hash: ff99e5d77033ac4305e8ab0debd7efb87983a8c22ed5b5c492cf0b4f04889e1e
    • Instruction Fuzzy Hash: 77D1263182465A8ADB01EF68D99069DF7B1FF96300F60C79AE4493B254EF706AC5CF90
    Memory Dump Source
    • Source File: 00000000.00000002.3279712165.0000000001020000.00000040.00000800.00020000.00000000.sdmp, Offset: 01020000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1020000_filedata.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c2209947655eeb836da418d481479dae62a82141db5ecf715db33641a5b68db3
    • Instruction ID: ee5a424516895124e3b4c954d278b7ef36b917fadd5a6e16be8fd97497af1a4d
    • Opcode Fuzzy Hash: c2209947655eeb836da418d481479dae62a82141db5ecf715db33641a5b68db3
    • Instruction Fuzzy Hash: AEA18332E0022ACFDF19DFB4C9445DEBBB2FF85300B2545AAE945AB215DB35E945CB80