Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
LisectAVT_2403002B_47.exe

Overview

General Information

Sample name:LisectAVT_2403002B_47.exe
Analysis ID:1481626
MD5:6fd4849beabb6b6d40230e9f4d491d26
SHA1:7811c23f6fef484d9d7bc9dd362a6ff389ad0dcc
SHA256:3ac758c494812836d63fb7016a040ef640dcc9700b7532f85b94f61b86a98bfc
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
AI detected suspicious sample
Uses known network protocols on non-standard ports
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • LisectAVT_2403002B_47.exe (PID: 6748 cmdline: "C:\Users\user\Desktop\LisectAVT_2403002B_47.exe" MD5: 6FD4849BEABB6B6D40230E9F4D491D26)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched
Timestamp:2024-07-25T12:06:30.933225+0200
SID:2803304
Source Port:49730
Destination Port:8000
Protocol:TCP
Classtype:Unknown Traffic
Timestamp:2024-07-25T12:06:31.348537+0200
SID:2022930
Source Port:443
Destination Port:49731
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T12:09:11.563670+0200
SID:2803304
Source Port:62776
Destination Port:8000
Protocol:TCP
Classtype:Unknown Traffic
Timestamp:2024-07-25T12:07:00.076102+0200
SID:2022930
Source Port:443
Destination Port:62771
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:2024-07-25T12:07:35.168663+0200
SID:2803304
Source Port:62773
Destination Port:8000
Protocol:TCP
Classtype:Unknown Traffic
Timestamp:2024-07-25T12:07:03.022906+0200
SID:2803304
Source Port:62772
Destination Port:8000
Protocol:TCP
Classtype:Unknown Traffic
Timestamp:2024-07-25T12:08:07.299887+0200
SID:2803304
Source Port:62774
Destination Port:8000
Protocol:TCP
Classtype:Unknown Traffic
Timestamp:2024-07-25T12:08:39.427971+0200
SID:2803304
Source Port:62775
Destination Port:8000
Protocol:TCP
Classtype:Unknown Traffic

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: LisectAVT_2403002B_47.exeAvira: detected
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: LisectAVT_2403002B_47.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE

Networking

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62772 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62773 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62774 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62775 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62776 -> 8000
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 156.254.126.18:8000
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: unknownTCP traffic detected without corresponding DNS query: 156.254.126.18
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /xb-4 HTTP/1.1Host: 156.254.126.18:8000Cache-Control: no-cache
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18/
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18/n
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-426.18:8000/xb-4
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-44j/
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-45
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmp, LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4C
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4H
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4Z
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4hqos.dll.mui
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4hqos.dll.mui2
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4wsock.dll.mui(
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://156.254.126.18:8000/xb-4z
Source: LisectAVT_2403002B_47.exeString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
Source: LisectAVT_2403002B_47.exeString found in binary or memory: http://s2.symcb.com0
Source: LisectAVT_2403002B_47.exeString found in binary or memory: http://www.symauth.com/cps0(
Source: LisectAVT_2403002B_47.exeString found in binary or memory: http://www.symauth.com/rpa00
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_0040DEC90_2_0040DEC9
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_004047160_2_00404716
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_0040D7AF0_2_0040D7AF
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00405FB00_2_00405FB0
Source: LisectAVT_2403002B_47.exe, 00000000.00000000.1675719598.0000000000429000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFL.exe4 vs LisectAVT_2403002B_47.exe
Source: LisectAVT_2403002B_47.exeBinary or memory string: OriginalFilenameFL.exe4 vs LisectAVT_2403002B_47.exe
Source: LisectAVT_2403002B_47.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
Source: classification engineClassification label: mal56.troj.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_004232A4 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,0_2_004232A4
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCommand line argument: NEA0_2_004144A0
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: LisectAVT_2403002B_47.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: LisectAVT_2403002B_47.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: LisectAVT_2403002B_47.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: LisectAVT_2403002B_47.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: LisectAVT_2403002B_47.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: LisectAVT_2403002B_47.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: LisectAVT_2403002B_47.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: LisectAVT_2403002B_47.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: LisectAVT_2403002B_47.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: LisectAVT_2403002B_47.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: LisectAVT_2403002B_47.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: LisectAVT_2403002B_47.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00444000 LoadLibraryW,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,FreeLibrary,0_2_00444000
Source: LisectAVT_2403002B_47.exeStatic PE information: real checksum: 0x41085 should be: 0x42e46
Source: LisectAVT_2403002B_47.exeStatic PE information: section name: .fixer
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00405886 push ecx; ret 0_2_00405899

Hooking and other Techniques for Hiding and Protection

barindex
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62772 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62773 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62774 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62775 -> 8000
Source: unknownNetwork traffic detected: HTTP traffic on port 62776 -> 8000
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00404716 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00404716
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeAPI coverage: 4.1 %
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exe TID: 6760Thread sleep time: -150000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exe TID: 6760Thread sleep time: -30000s >= -30000sJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeThread delayed: delay time: 30000Jump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeThread delayed: delay time: 30000Jump to behavior
Source: LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A8000.00000004.00000020.00020000.00000000.sdmp, LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000064E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00409371 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00409371
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00444000 LoadLibraryW,GetProcAddress,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,FreeLibrary,0_2_00444000
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00422BFE mov edx, dword ptr fs:[00000030h]0_2_00422BFE
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_0040A60E mov eax, dword ptr fs:[00000030h]0_2_0040A60E
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_0040D430 GetProcessHeap,0_2_0040D430
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00409371 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00409371
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00404B27 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00404B27
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_004054A9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004054A9
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_0040563B SetUnhandledExceptionFilter,0_2_0040563B
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_00405690 cpuid 0_2_00405690
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_004058A0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_004058A0
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_0040F895 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_0040F895
Source: C:\Users\user\Desktop\LisectAVT_2403002B_47.exeCode function: 0_2_004023B0 __ehhandler$??1_Scoped_lock@?$SafeRWList@UListEntry@details@Concurrency@@VNoCount@CollectionTypes@23@V_ReaderWriterLock@23@@details@Concurrency@@QAE@XZ,0_2_004023B0
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
11
Virtualization/Sandbox Evasion
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts1
Native API
Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Obfuscated Files or Information
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media11
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
Process Discovery
Distributed Component Object ModelInput Capture1
Non-Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets12
System Information Discovery
SSHKeylogging1
Application Layer Protocol
Scheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
LisectAVT_2403002B_47.exe100%AviraBDS/Redcap.kouft
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://www.symauth.com/rpa000%URL Reputationsafe
http://www.symauth.com/cps0(0%URL Reputationsafe
http://156.254.126.18:8000/xb-44j/0%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-4Z0%Avira URL Cloudsafe
http://156.254.126.18/0%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-40%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-4hqos.dll.mui0%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-450%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-4wsock.dll.mui(0%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-426.18:8000/xb-40%Avira URL Cloudsafe
http://156.254.126.18/n0%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-4H0%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-4hqos.dll.mui20%Avira URL Cloudsafe
http://156.254.126.18:8000/xb-4C0%Avira URL Cloudsafe
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://156.254.126.18:8000/xb-4false
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
http://156.254.126.18:8000/xb-4hqos.dll.muiLisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.254.126.18:8000/xb-4wsock.dll.mui(LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.254.126.18:8000/xb-44j/LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://www.symauth.com/rpa00LisectAVT_2403002B_47.exefalse
  • URL Reputation: safe
unknown
http://156.254.126.18:8000/xb-45LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.254.126.18/LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.254.126.18:8000/xb-4ZLisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://156.254.126.18:8000/xb-4zLisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpfalse
    unknown
    http://156.254.126.18/nLisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://156.254.126.18:8000/xb-426.18:8000/xb-4LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://156.254.126.18:8000/xb-4HLisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://www.symauth.com/cps0(LisectAVT_2403002B_47.exefalse
    • URL Reputation: safe
    unknown
    http://156.254.126.18:8000/xb-4hqos.dll.mui2LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.000000000068A000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://156.254.126.18:8000/xb-4CLisectAVT_2403002B_47.exe, 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmp, LisectAVT_2403002B_47.exe, 00000000.00000002.3526647092.00000000006A1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    156.254.126.18
    unknownSeychelles
    135026THINKDREAM-AS-APThinkDreamTechnologyLimitedHKfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1481626
    Start date and time:2024-07-25 12:05:19 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 57s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:LisectAVT_2403002B_47.exe
    Detection:MAL
    Classification:mal56.troj.winEXE@1/0@0/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 4
    • Number of non-executed functions: 52
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): d.8.0.a.e.e.f.b.0.0.0.0.0.0.0.0.5.0.0.0.0.0.8.0.0.3.0.1.3.0.6.2.ip6.arpa, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: LisectAVT_2403002B_47.exe
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    156.254.126.18gx.elfGet hashmaliciousChaosBrowse
    • 156.254.126.18:8080/password.txt
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    THINKDREAM-AS-APThinkDreamTechnologyLimitedHK4qOdQ3lrYx.elfGet hashmaliciousMiraiBrowse
    • 119.8.28.218
    jhpg1LVUrZ.elfGet hashmaliciousMiraiBrowse
    • 119.8.28.202
    https://link.mail.beehiiv.com/ls/click?upn=u001.AafWW5Nqnbo2z-2BTA50bGEdcgdlKW6veoHg9i0lfVykqgG210mMbY9x6wlCJFem63Ptvb1AhwNnKu2bFWir67u4CZi9kAG27a28kN3PuYedxeUyKmOac6ITo-2BRFaF-2Bd-2Fi2Ixv82DfFvf02BiAI4hE-2B33SFQFo6ls2LdouLvYQ4evOtL64w0kovPYLtYVrx27PXV8C_Brrq8-2Fl00XKb7EalRYiEGmX6heUjj2STeswY-2BsiIt8od5e7wnskh4Flyd2gRfoUQMNxCsUTDSaFM8zPDLSGDGP82i7-2F2T8vItuV5dWHeXDAA5lbmJvOIRHwwHLaZqkTAe-2FUo72xufSnVCNP9jOcjTziRyEgpuuJQJiZBB3fK9Jfw-2BwXqmN7-2Bgu5oQ-2B1xbFghH62g1lHFS1Y4CHHJPc0auTlLsB05ygQ-2FI-2F7sxR9u8jR91M7H-2BbzqUKzs-2BT3ZKLeFEIL3152abEbru7Xm-2FQccrWU8wpYyuMKn02Tn-2B2EMXTmjNNbbalm-2BJ6GnnTdkYphMczl4vx3aqH514BnG-2FxWL6zJOg9p0nIer2lira82L8b5vTqtEzMFFrshInaCk-2FIKuK7IqIBd82nujTq2sahPgOcOQZPE1-2F-2BLJyD2o7TtDkzFXunFRnYrxODO7DLzvTUoA#SZ2JyYWRsZXlAdmNjdW9ubGluZS5uZXQ=&d=DwMFaQGet hashmaliciousHTMLPhisherBrowse
    • 156.227.6.70
    sBgS8t0K7i.elfGet hashmaliciousMiraiBrowse
    • 103.206.123.198
    Qd0pExC2i1.elfGet hashmaliciousMiraiBrowse
    • 103.206.123.186
    HxTjtCwHSe.elfGet hashmaliciousMiraiBrowse
    • 103.206.123.189
    tY2bVScm0v.elfGet hashmaliciousMiraiBrowse
    • 103.114.133.123
    PO34730937398.exeGet hashmaliciousRHADAMANTHYSBrowse
    • 156.227.6.50
    sales contract-876 & New-Order.exeGet hashmaliciousFormBookBrowse
    • 156.227.6.30
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.87364273870965
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:LisectAVT_2403002B_47.exe
    File size:266'752 bytes
    MD5:6fd4849beabb6b6d40230e9f4d491d26
    SHA1:7811c23f6fef484d9d7bc9dd362a6ff389ad0dcc
    SHA256:3ac758c494812836d63fb7016a040ef640dcc9700b7532f85b94f61b86a98bfc
    SHA512:367d544c24a4c0ef40f05bd83181c64adb1d49e9a154b25648900cf604d74893fdc643e5f1de0de0bce0c0f19e802f83be6a9c85423800ffb8c330a2806198e6
    SSDEEP:3072:sp4xw3IkbNoyP6niK6gc31EvtAg0FubKk0Drz8ZcETg3+vhjNZQfGZ7DaTIOYWt7:w4k/oyPZKfAOB0DrAZtj7QfGZ7uOes
    TLSH:2B448E183CD18677D7A239B50CA5DBB5DC6FED7007608BEBA394EB790E242C22523563
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........@...!...!...!..c.!..!..c.#.@!..c."..!.......!.......!.......!...YC..!...!...!..@....!..E./..!...!G..!..@....!..Rich.!.........
    Icon Hash:2f3979797939190f
    Entrypoint:0x405316
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
    Time Stamp:0x5C6FB2CC [Fri Feb 22 08:29:00 2019 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:db8de496dd66110cf35d3e281bf4cecf
    Signature Valid:
    Signature Issuer:
    Signature Validation Error:
    Error Number:
    Not Before, Not After
      Subject Chain
        Version:
        Thumbprint MD5:
        Thumbprint SHA-1:
        Thumbprint SHA-256:
        Serial:
        Instruction
        call 00007F8CAD529535h
        jmp 00007F8CAD528E43h
        push eax
        push dword ptr fs:[00000000h]
        lea eax, dword ptr [esp+0Ch]
        sub esp, dword ptr [esp+0Ch]
        push ebx
        push esi
        push edi
        mov dword ptr [eax], ebp
        mov ebp, eax
        mov eax, dword ptr [00422070h]
        xor eax, ebp
        push eax
        mov dword ptr [ebp-10h], esp
        push dword ptr [ebp-04h]
        mov dword ptr [ebp-04h], FFFFFFFFh
        lea eax, dword ptr [ebp-0Ch]
        mov dword ptr fs:[00000000h], eax
        ret
        jmp dword ptr [0041514Ch]
        int3
        int3
        int3
        mov eax, dword ptr [esp+08h]
        mov ecx, dword ptr [esp+10h]
        or ecx, eax
        mov ecx, dword ptr [esp+0Ch]
        jne 00007F8CAD528FBBh
        mov eax, dword ptr [esp+04h]
        mul ecx
        retn 0010h
        push ebx
        mul ecx
        mov ebx, eax
        mov eax, dword ptr [esp+08h]
        mul dword ptr [esp+14h]
        add ebx, eax
        mov eax, dword ptr [esp+08h]
        mul ecx
        add edx, ebx
        pop ebx
        retn 0010h
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        push ebx
        push esi
        mov eax, dword ptr [esp+18h]
        or eax, eax
        jne 00007F8CAD528FCAh
        mov ecx, dword ptr [esp+14h]
        mov eax, dword ptr [esp+10h]
        xor edx, edx
        div ecx
        mov ebx, eax
        mov eax, dword ptr [esp+0Ch]
        div ecx
        mov edx, ebx
        jmp 00007F8CAD528FF3h
        mov ecx, eax
        mov ebx, dword ptr [esp+14h]
        mov edx, dword ptr [esp+10h]
        mov eax, dword ptr [esp+0Ch]
        shr ecx, 1
        rcr ebx, 1
        shr edx, 1
        rcr eax, 1
        or ecx, ecx
        jne 00007F8CAD528FA6h
        div ebx
        Programming Language:
        • [IMP] VS2008 SP1 build 30729
        • [RES] VS2015 UPD3 build 24213
        • [LNK] VS2015 UPD3.1 build 24215
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x20a180x3c.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x290000x18f75.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x3e0000x17b8.rsrc
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x420000x19a0.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x1f8d00x1c.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x1f94c0x18.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1f8f00x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x150000x14c.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x13eca0x1400011bd66c136a0971b16fad0a1a615f10aFalse0.56595458984375data6.65250970718716IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x150000xc1b60xc2009376d3c48f5711d894cfc4cc970e991bFalse0.4856233891752577data5.512658321404061IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x220000x49cc0x36009c4499e7123eeef0788848a120c133c4False0.8470775462962963DOS executable (block device driver ght (c)7.3991199987904475IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .gfids0x270000x1500x20002b5641edb4343181cc0d842b828dfb0False0.43359375data2.3451760582622585IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .tls0x280000x90x2001f354d76203061bfdd5a53dae48d5435False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x290000x18f750x1900005e6351956f8ef10302bda20bd90cb75False0.747255859375data7.122480667277769IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x420000x19a00x1a00f8cc0291e51a455217c80f30ddfe173aFalse0.7086838942307693data6.53789180717345IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        .fixer0x440000x10000x10003424e2cbf1f4167b8f7b4789f0e943faFalse0.087158203125data1.3316124420719018IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x293700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640DutchBelgium0.6868279569892473
        RT_ICON0x296580x128Device independent bitmap graphic, 16 x 32 x 4, image size 192DutchBelgium0.7027027027027027
        RT_ICON0x297800xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688DutchBelgium0.660181236673774
        RT_ICON0x2a6280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152DutchBelgium0.7906137184115524
        RT_ICON0x2aed00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320DutchBelgium0.7947976878612717
        RT_ICON0x2b4380xbe87PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedDutchBelgium0.995961045617632
        RT_ICON0x372c00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896DutchBelgium0.4417808219178082
        RT_ICON0x3b4e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600DutchBelgium0.4954356846473029
        RT_ICON0x3da900x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720DutchBelgium0.527810650887574
        RT_ICON0x3f4f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224DutchBelgium0.5874765478424016
        RT_ICON0x405a00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400DutchBelgium0.6610655737704918
        RT_ICON0x40f280x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680DutchBelgium0.7069767441860465
        RT_ICON0x415e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088DutchBelgium0.7854609929078015
        RT_GROUP_ICON0x41a480xbcdataDutchBelgium0.6542553191489362
        RT_VERSION0x41b040x2e8dataDutchBelgium0.4731182795698925
        RT_MANIFEST0x41dec0x189XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsEnglishUnited States0.6081424936386769
        DLLImport
        KERNEL32.dllGetFileAttributesW, GetLastError, CloseHandle, WideCharToMultiByte, LoadLibraryW, GetProcAddress, FreeLibrary, SetCurrentDirectoryW, GetModuleHandleW, FindClose, GetModuleFileNameW, MultiByteToWideChar, GetModuleFileNameA, FlushFileBuffers, SetFilePointerEx, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, SetLastError, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetSystemTimeAsFileTime, GetStringTypeW, CompareStringW, LCMapStringW, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, InitializeSListHead, RaiseException, RtlUnwind, LoadLibraryExW, CreateFileW, GetDriveTypeW, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, HeapAlloc, HeapReAlloc, HeapFree, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetACP, GetCurrentDirectoryW, GetFullPathNameW, SetStdHandle, GetProcessHeap, GetTimeZoneInformation, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, HeapSize, GetConsoleCP, GetConsoleMode, WriteConsoleW
        ADVAPI32.dllRegQueryValueExW, RegCloseKey, RegOpenKeyExW
        Language of compilation systemCountry where language is spokenMap
        DutchBelgium
        EnglishUnited States
        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
        2024-07-25T12:06:30.933225+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa497308000192.168.2.4156.254.126.18
        2024-07-25T12:06:31.348537+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434973120.114.59.183192.168.2.4
        2024-07-25T12:09:11.563670+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa627768000192.168.2.4156.254.126.18
        2024-07-25T12:07:00.076102+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4436277120.114.59.183192.168.2.4
        2024-07-25T12:07:35.168663+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa627738000192.168.2.4156.254.126.18
        2024-07-25T12:07:03.022906+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa627728000192.168.2.4156.254.126.18
        2024-07-25T12:08:07.299887+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa627748000192.168.2.4156.254.126.18
        2024-07-25T12:08:39.427971+0200TCP2803304ETPRO MALWARE Common Downloader Header Pattern HCa627758000192.168.2.4156.254.126.18
        TimestampSource PortDest PortSource IPDest IP
        Jul 25, 2024 12:06:28.793858051 CEST497308000192.168.2.4156.254.126.18
        Jul 25, 2024 12:06:28.798834085 CEST800049730156.254.126.18192.168.2.4
        Jul 25, 2024 12:06:28.799062967 CEST497308000192.168.2.4156.254.126.18
        Jul 25, 2024 12:06:28.799097061 CEST497308000192.168.2.4156.254.126.18
        Jul 25, 2024 12:06:28.805315018 CEST800049730156.254.126.18192.168.2.4
        Jul 25, 2024 12:06:30.933046103 CEST800049730156.254.126.18192.168.2.4
        Jul 25, 2024 12:06:30.933224916 CEST497308000192.168.2.4156.254.126.18
        Jul 25, 2024 12:06:30.933224916 CEST497308000192.168.2.4156.254.126.18
        Jul 25, 2024 12:06:30.938256025 CEST800049730156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:00.945879936 CEST627728000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:00.951514006 CEST800062772156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:00.952270031 CEST627728000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:00.953613997 CEST627728000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:00.962236881 CEST800062772156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:03.022721052 CEST800062772156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:03.022906065 CEST627728000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:03.040539026 CEST627728000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:03.045639038 CEST800062772156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:33.068841934 CEST627738000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:33.075333118 CEST800062773156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:33.075449944 CEST627738000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:33.075773954 CEST627738000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:33.082120895 CEST800062773156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:35.168554068 CEST800062773156.254.126.18192.168.2.4
        Jul 25, 2024 12:07:35.168663025 CEST627738000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:35.168766975 CEST627738000192.168.2.4156.254.126.18
        Jul 25, 2024 12:07:35.175183058 CEST800062773156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:05.177280903 CEST627748000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:05.189580917 CEST800062774156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:05.189717054 CEST627748000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:05.189961910 CEST627748000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:05.195058107 CEST800062774156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:07.299793959 CEST800062774156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:07.299886942 CEST627748000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:07.299995899 CEST627748000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:07.305043936 CEST800062774156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:37.304630995 CEST627758000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:37.311825037 CEST800062775156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:37.312037945 CEST627758000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:37.312366962 CEST627758000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:37.319538116 CEST800062775156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:39.427896976 CEST800062775156.254.126.18192.168.2.4
        Jul 25, 2024 12:08:39.427970886 CEST627758000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:39.428055048 CEST627758000192.168.2.4156.254.126.18
        Jul 25, 2024 12:08:39.434741974 CEST800062775156.254.126.18192.168.2.4
        Jul 25, 2024 12:09:09.442948103 CEST627768000192.168.2.4156.254.126.18
        Jul 25, 2024 12:09:09.448237896 CEST800062776156.254.126.18192.168.2.4
        Jul 25, 2024 12:09:09.448374033 CEST627768000192.168.2.4156.254.126.18
        Jul 25, 2024 12:09:09.448532104 CEST627768000192.168.2.4156.254.126.18
        Jul 25, 2024 12:09:09.454703093 CEST800062776156.254.126.18192.168.2.4
        Jul 25, 2024 12:09:11.563473940 CEST800062776156.254.126.18192.168.2.4
        Jul 25, 2024 12:09:11.563669920 CEST627768000192.168.2.4156.254.126.18
        Jul 25, 2024 12:09:11.563967943 CEST627768000192.168.2.4156.254.126.18
        Jul 25, 2024 12:09:11.569170952 CEST800062776156.254.126.18192.168.2.4
        TimestampSource PortDest PortSource IPDest IP
        Jul 25, 2024 12:06:58.402859926 CEST5352837162.159.36.2192.168.2.4
        Jul 25, 2024 12:06:58.906377077 CEST53531961.1.1.1192.168.2.4
        • 156.254.126.18:8000
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.449730156.254.126.1880006748C:\Users\user\Desktop\LisectAVT_2403002B_47.exe
        TimestampBytes transferredDirectionData
        Jul 25, 2024 12:06:28.799097061 CEST74OUTGET /xb-4 HTTP/1.1
        Host: 156.254.126.18:8000
        Cache-Control: no-cache


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.462772156.254.126.1880006748C:\Users\user\Desktop\LisectAVT_2403002B_47.exe
        TimestampBytes transferredDirectionData
        Jul 25, 2024 12:07:00.953613997 CEST74OUTGET /xb-4 HTTP/1.1
        Host: 156.254.126.18:8000
        Cache-Control: no-cache


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.462773156.254.126.1880006748C:\Users\user\Desktop\LisectAVT_2403002B_47.exe
        TimestampBytes transferredDirectionData
        Jul 25, 2024 12:07:33.075773954 CEST74OUTGET /xb-4 HTTP/1.1
        Host: 156.254.126.18:8000
        Cache-Control: no-cache


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.462774156.254.126.1880006748C:\Users\user\Desktop\LisectAVT_2403002B_47.exe
        TimestampBytes transferredDirectionData
        Jul 25, 2024 12:08:05.189961910 CEST74OUTGET /xb-4 HTTP/1.1
        Host: 156.254.126.18:8000
        Cache-Control: no-cache


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.462775156.254.126.1880006748C:\Users\user\Desktop\LisectAVT_2403002B_47.exe
        TimestampBytes transferredDirectionData
        Jul 25, 2024 12:08:37.312366962 CEST74OUTGET /xb-4 HTTP/1.1
        Host: 156.254.126.18:8000
        Cache-Control: no-cache


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        5192.168.2.462776156.254.126.1880006748C:\Users\user\Desktop\LisectAVT_2403002B_47.exe
        TimestampBytes transferredDirectionData
        Jul 25, 2024 12:09:09.448532104 CEST74OUTGET /xb-4 HTTP/1.1
        Host: 156.254.126.18:8000
        Cache-Control: no-cache


        Click to jump to process

        Click to jump to process

        Target ID:0
        Start time:06:06:10
        Start date:25/07/2024
        Path:C:\Users\user\Desktop\LisectAVT_2403002B_47.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\LisectAVT_2403002B_47.exe"
        Imagebase:0x400000
        File size:266'752 bytes
        MD5 hash:6FD4849BEABB6B6D40230E9F4D491D26
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Reset < >

          Execution Graph

          Execution Coverage:2.1%
          Dynamic/Decrypted Code Coverage:0%
          Signature Coverage:46.4%
          Total number of Nodes:28
          Total number of Limit Nodes:3
          execution_graph 9980 422b33 9983 4236a9 9980->9983 9982 422b3e 9984 4236d5 9983->9984 9985 4236ce 9983->9985 9997 422bfe 9984->9997 9985->9982 9987 4236de 9987->9985 10004 4232a4 CreateToolhelp32Snapshot 9987->10004 9990 4232a4 4 API calls 9991 423896 9990->9991 9992 4238bd Sleep 9991->9992 9995 4238d0 9991->9995 9993 4232a4 4 API calls 9992->9993 9993->9991 9995->9985 9996 4238d2 Sleep 9995->9996 10011 4235b9 InternetOpenA 9995->10011 9996->9995 9998 422c14 GetPEB 9997->9998 10003 422c0d 9997->10003 9999 422c28 9998->9999 10000 422ed8 LoadLibraryA 9999->10000 9999->10003 10001 422f0a 10000->10001 10000->10003 10002 42311b LoadLibraryA 10001->10002 10001->10003 10002->10003 10003->9987 10005 4232c5 Process32FirstW 10004->10005 10008 423551 Sleep 10004->10008 10006 4232e4 10005->10006 10010 4232de FindCloseChangeNotification 10005->10010 10006->10008 10009 423536 Process32NextW 10006->10009 10008->9990 10009->10006 10009->10010 10010->10008 10012 4235fa InternetOpenUrlA 10011->10012 10013 423614 10011->10013 10012->10013 10013->9995

          Control-flow Graph

          APIs
          • CreateToolhelp32Snapshot.KERNEL32(0000000F,00000000), ref: 004232B4
          • Process32FirstW.KERNEL32(00000000,?), ref: 004232D7
          • FindCloseChangeNotification.KERNELBASE(?), ref: 0042354E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ChangeCloseCreateFindFirstNotificationProcess32SnapshotToolhelp32
          • String ID: C$M$Q360Saf$a$l$n$o$s$s
          • API String ID: 692674288-2495611964
          • Opcode ID: 3a7e114790ac83807ee783d4973c5ba35863f74a632842655462cc972086b0dd
          • Instruction ID: ea301f65fb63b90236c93c6f34219e0de73ff33be3de113c62dd973678eed83a
          • Opcode Fuzzy Hash: 3a7e114790ac83807ee783d4973c5ba35863f74a632842655462cc972086b0dd
          • Instruction Fuzzy Hash: A681A630A0C36CAAEB219B24DC557EAA7B8EF44744F0054DDD14C972D1E6BA6FC48F19

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 30 422bfe-422c0b 31 422c14-422c25 GetPEB 30->31 32 422c0d-422c0f 30->32 34 422c28-422c34 31->34 33 4232a0-4232a3 32->33 34->34 35 422c36-422c3f 34->35 35->32 36 422c41-422c7a call 422b41 35->36 36->32 39 422c7c-422cb5 call 422b41 36->39 39->32 42 422cbb-422ceb call 422b41 39->42 42->32 45 422cf1-422d17 call 422b41 42->45 45->32 48 422d1d-422d4d call 422b41 45->48 48->32 51 422d53-422d80 call 422b41 48->51 51->32 54 422d86-422dac call 422b41 51->54 54->32 57 422db2-422de9 call 422b41 54->57 57->32 60 422def-422e15 call 422b41 57->60 60->32 63 422e1b-422e4b call 422b41 60->63 63->32 66 422e51-422e95 call 422b41 63->66 66->32 69 422e9b-422ed2 call 422b41 66->69 69->32 72 422ed8-422f04 LoadLibraryA 69->72 72->32 73 422f0a-422f44 call 422b41 72->73 73->32 76 422f4a-422f84 call 422b41 73->76 76->32 79 422f8a-422fad call 422b41 76->79 79->32 82 422fb3-422fe0 call 422b41 79->82 82->32 85 422fe6-423016 call 422b41 82->85 85->32 88 42301c-423073 call 422b41 85->88 88->32 91 423079-4230b3 call 422b41 88->91 91->32 94 4230b9-4230df call 422b41 91->94 94->32 97 4230e5-423115 call 422b41 94->97 97->32 100 42311b-423147 LoadLibraryA 97->100 100->32 101 42314d-42317e call 422b41 100->101 101->32 104 423184-4231c5 call 422b41 101->104 104->32 107 4231cb-423205 call 422b41 104->107 107->32 110 42320b-423260 call 422b41 107->110 110->32 113 423266-42329e call 422b41 110->113 113->33
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID:
          • String ID: LoadLibraryA$Mess$eadP$roce$ssId
          • API String ID: 0-735157309
          • Opcode ID: b36e120d0833b7731a54506a0c70d5ba7736ed5fbba49d6459cd0983861c9288
          • Instruction ID: b586430f75ab145293ba667e9a8f67668a4fff5002a76f18b79429bede9ffe87
          • Opcode Fuzzy Hash: b36e120d0833b7731a54506a0c70d5ba7736ed5fbba49d6459cd0983861c9288
          • Instruction Fuzzy Hash: 92F12FB1D0422A9BDB61CF56DA81BD9BBB4BF24300F5081DA958CE6245DBB4DBC0CF58

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 116 4236a9-4236cc 117 4236d5-4236e0 call 422bfe 116->117 118 4236ce-4236d0 116->118 117->118 122 4236e2-4236ee 117->122 119 42391a-423920 118->119 122->122 123 4236f0 122->123 124 4236f2-4236f6 123->124 125 4236f8-423898 call 4232a4 Sleep call 4232a4 123->125 124->122 124->125 130 4238bd-4238ce Sleep call 4232a4 125->130 133 4238d0 130->133 134 42389a-4238b8 130->134 135 4238db-4238f2 call 4235b9 133->135 134->130 139 4238d2-4238d7 Sleep 135->139 140 4238f4-423911 call 42355c call 423da0 135->140 139->135 146 423913 140->146 147 423918 140->147 146->147 147->119
          APIs
          • Sleep.KERNELBASE(000007D0), ref: 0042388B
          • Sleep.KERNELBASE(000007D0), ref: 004238BD
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Sleep
          • String ID: 0$0$6$ck(W$hQkS
          • API String ID: 3472027048-2213254173
          • Opcode ID: 2c66a0ee2386820558b81d1253ee446268f83519f76bd6f3ac3aa14a6fcf5d4c
          • Instruction ID: b063393dda38bf1b8e8c1fc40eaeb6db28000a4d690f90c6b281b0b53222eae8
          • Opcode Fuzzy Hash: 2c66a0ee2386820558b81d1253ee446268f83519f76bd6f3ac3aa14a6fcf5d4c
          • Instruction Fuzzy Hash: 205143B1509391DFD3309F15A845B8FBBF8FF80705F50891EE5989A240DB788606CBAB

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 148 4235b9-4235f4 InternetOpenA 149 4236a2-4236a8 148->149 150 4235fa-42360e InternetOpenUrlA 148->150 151 423614-423634 150->151 152 42369c 150->152 154 423696 151->154 155 423636-423640 151->155 152->149 154->152 155->154 157 423642-423648 155->157 158 42364a-42365a 157->158 159 42365f-423675 157->159 162 423685-42368b 158->162 163 42365c 158->163 159->162 164 423677-42367c 159->164 167 42368e-423694 162->167 163->159 164->162 165 42367e 164->165 166 423680-423683 165->166 165->167 166->157 167->154
          APIs
          • InternetOpenA.WININET(?,00000001,00000000,00000000,00000000), ref: 004235EC
          • InternetOpenUrlA.WININET(00000000,?,00000000,00000000,80000000,00000000), ref: 00423606
          Memory Dump Source
          • Source File: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: InternetOpen
          • String ID:
          • API String ID: 2038078732-0
          • Opcode ID: 77c53ca93e236c562defaffb78af67adc030127ede9e7ff349b1119ef9f3d8a5
          • Instruction ID: 7a828d8358b6daa98ad7c03c44e6977a739d63b350b14f336fab54bd7487e73a
          • Opcode Fuzzy Hash: 77c53ca93e236c562defaffb78af67adc030127ede9e7ff349b1119ef9f3d8a5
          • Instruction Fuzzy Hash: 4231D8B1E00219FFDB20DF95CD88AAEBBB9FF08305F504469E546E2250D7789E449B24

          Control-flow Graph

          APIs
          • LoadLibraryW.KERNEL32(00441E00), ref: 00444019
          • GetProcAddress.KERNEL32(00000000,646F636E), ref: 00444025
          • GetCurrentProcess.KERNEL32(?,00441E2D,00000004,00000000), ref: 0044403E
          • GetCurrentProcess.KERNEL32(?,00441E31,00000002,00000000,?,00441E2D,00000004,00000000), ref: 00444057
          • GetCurrentProcess.KERNEL32(?,00441E33,00000003,00000000,?,00441E31,00000002,00000000,?,00441E2D,00000004,00000000), ref: 00444070
          • GetCurrentProcess.KERNEL32(?,00441E36,00000005,00000000,?,00441E33,00000003,00000000,?,00441E31,00000002,00000000,?,00441E2D,00000004,00000000), ref: 00444089
          • GetCurrentProcess.KERNEL32(?,00441E3B,0000000B,00000000,?,00441E36,00000005,00000000,?,00441E33,00000003,00000000,?,00441E31,00000002,00000000), ref: 004440A2
          • GetCurrentProcess.KERNEL32(?,00441E46,00000006,00000000,?,00441E3B,0000000B,00000000,?,00441E36,00000005,00000000,?,00441E33,00000003,00000000), ref: 004440BB
          • GetCurrentProcess.KERNEL32(?,00441E4C,00000007,00000000,?,00441E46,00000006,00000000,?,00441E3B,0000000B,00000000,?,00441E36,00000005,00000000), ref: 004440D4
          • GetCurrentProcess.KERNEL32(?,00441E53,00000001,00000000,?,00441E4C,00000007,00000000,?,00441E46,00000006,00000000,?,00441E3B,0000000B,00000000), ref: 004440ED
          Memory Dump Source
          • Source File: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: CurrentProcess$AddressLibraryLoadProc
          • String ID:
          • API String ID: 3180543935-0
          • Opcode ID: bf3e07137b0beb4a52e0053cdb9eb43d7be91cec0d8cae02cce42a71bbe23a88
          • Instruction ID: e5d195f8fff31ccf77d7fe84f9012ba492b6e0f0acfd17ef9f710123e8bfc7af
          • Opcode Fuzzy Hash: bf3e07137b0beb4a52e0053cdb9eb43d7be91cec0d8cae02cce42a71bbe23a88
          • Instruction Fuzzy Hash: 09513CB2650709BFE640ABF8DC4DFD63A9CEB4C745F404431B30CD6280D768EA1887A8
          APIs
          • _free.LIBCMT ref: 0040F8A5
            • Part of subcall function 0040A0D4: HeapFree.KERNEL32(00000000,00000000,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?), ref: 0040A0EA
            • Part of subcall function 0040A0D4: GetLastError.KERNEL32(?,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?,?), ref: 0040A0FC
          • GetTimeZoneInformation.KERNEL32 ref: 0040F8B7
          • WideCharToMultiByte.KERNEL32(00000000,?,0042364C,000000FF,?,0000003F,?,?), ref: 0040F92F
          • WideCharToMultiByte.KERNEL32(00000000,?,004236A0,000000FF,?,0000003F,?,?,?,0042364C,000000FF,?,0000003F,?,?), ref: 0040F95C
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
          • String ID:
          • API String ID: 806657224-0
          • Opcode ID: 215096cbdcae1f8da96745ef043b85de9c26519771fb4ba832711c0c73d95392
          • Instruction ID: 6e57f7e2d0a2053b15716a2412924180c1bac2f3857dd3741ad5d86193e84dda
          • Opcode Fuzzy Hash: 215096cbdcae1f8da96745ef043b85de9c26519771fb4ba832711c0c73d95392
          • Instruction Fuzzy Hash: 7C31ABB1A00245FFCB31DFA9DC8096ABBB8BF5571075442BBE050A73A1D3399A06DB58
          APIs
          • IsProcessorFeaturePresent.KERNEL32(00000017,?,00000007), ref: 004054B6
          • IsDebuggerPresent.KERNEL32(?,?,?,00000017,?,00000007), ref: 0040557E
          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,00000017,?,00000007), ref: 0040559D
          • UnhandledExceptionFilter.KERNEL32(?,?,?,?,00000017,?,00000007), ref: 004055A7
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
          • String ID:
          • API String ID: 254469556-0
          • Opcode ID: 404194f505ab6bcc554436712299a4a2aff77fb66b116873bf98776274aa3698
          • Instruction ID: 2c3cb7413c07a9c782ae6c42a12524f6d5191052f304192687f7892d7edc3cd0
          • Opcode Fuzzy Hash: 404194f505ab6bcc554436712299a4a2aff77fb66b116873bf98776274aa3698
          • Instruction Fuzzy Hash: A53107B5D0522CDBDB20DFA5D9896CEBBB8FF48305F1041AAE40DAB250E7345A84CF84
          APIs
          • GetSystemTimeAsFileTime.KERNEL32 ref: 004058CF
          • GetCurrentThreadId.KERNEL32 ref: 004058DE
          • GetCurrentProcessId.KERNEL32 ref: 004058E7
          • QueryPerformanceCounter.KERNEL32(?), ref: 004058F4
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
          • String ID:
          • API String ID: 2933794660-0
          • Opcode ID: 1b3a825cc706b74735f712516263f2fb5b8ac3cc0a29f07f8ba54018fa2c8f50
          • Instruction ID: fbfe4691f84679fef18e7ff33e83e5debe7ff519a6be1f3678a07b2cc86d359d
          • Opcode Fuzzy Hash: 1b3a825cc706b74735f712516263f2fb5b8ac3cc0a29f07f8ba54018fa2c8f50
          • Instruction Fuzzy Hash: 8D11E075D05A08DBCB14CBB4E9481EEBBB0EB4C310B91857BD803E7280DB348A01CF49
          APIs
          • IsDebuggerPresent.KERNEL32 ref: 00409469
          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00409473
          • UnhandledExceptionFilter.KERNEL32(?), ref: 00409480
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled$DebuggerPresent
          • String ID:
          • API String ID: 3906539128-0
          • Opcode ID: 6d05ee05fdbd1b9a0dd489d33e8ae2999e111935a8bff4fc6c0049eb1948d3fa
          • Instruction ID: 56c3b2a019c41920525924eedc28813e36dcba2a4ad85c36c50cd910d3ea6526
          • Opcode Fuzzy Hash: 6d05ee05fdbd1b9a0dd489d33e8ae2999e111935a8bff4fc6c0049eb1948d3fa
          • Instruction Fuzzy Hash: C631C274901218ABCB21DF65D9897DDBBB8BF48310F5046EAE80CA7291E7349F818F48
          APIs
          • GetCurrentProcess.KERNEL32(00000003,?,0040A5E4,00000003,00420690,0000000C,0040A6F7,00000003,00000002,00000000,?,0040A0B7,00000003), ref: 0040A62F
          • TerminateProcess.KERNEL32(00000000,?,0040A5E4,00000003,00420690,0000000C,0040A6F7,00000003,00000002,00000000,?,0040A0B7,00000003), ref: 0040A636
          • ExitProcess.KERNEL32 ref: 0040A648
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Process$CurrentExitTerminate
          • String ID:
          • API String ID: 1703294689-0
          • Opcode ID: 721ab978f54cbce462c27a4fe3a09cb37437b04cd829fb710bf6f337512a355f
          • Instruction ID: 693879e349d8a07138d15f2ebcff5f69683aa6f8293a49bea3ff601a8daea9ae
          • Opcode Fuzzy Hash: 721ab978f54cbce462c27a4fe3a09cb37437b04cd829fb710bf6f337512a355f
          • Instruction Fuzzy Hash: 6AE04F32000604EFCF016F60CC08AC93F39EF44741B048435F94966262CB3ADD53CA9D
          APIs
          • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,?,?,?,0040D7AA,?,?,?,?,?,?,00000000), ref: 0040D9DC
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ExceptionRaise
          • String ID:
          • API String ID: 3997070919-0
          • Opcode ID: 6ee6114958ef5b940a365093dfef52e91a631aab357f1a753731accc93427e7c
          • Instruction ID: 7779b2fec0980917fd9de0f92ead704795e76caf878fd6bc5e49e2f076afb18b
          • Opcode Fuzzy Hash: 6ee6114958ef5b940a365093dfef52e91a631aab357f1a753731accc93427e7c
          • Instruction Fuzzy Hash: 86B16B72A10608DFD718CF68C486B657BE0FF45324F258669E899DF2E1C339E986CB44
          APIs
          • SetUnhandledExceptionFilter.KERNEL32(Function_00005647,004051A1), ref: 00405640
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: c941ad497f0eaebb4d9a4deb7122c6e295a3ee5fce6079653569e34823ac70f0
          • Instruction ID: b30fad5db58dceec2b94860587723317c94b67e66f094e628d3c2fe363f57e98
          • Opcode Fuzzy Hash: c941ad497f0eaebb4d9a4deb7122c6e295a3ee5fce6079653569e34823ac70f0
          • Instruction Fuzzy Hash:
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: HeapProcess
          • String ID:
          • API String ID: 54951025-0
          • Opcode ID: 61ec7acb2f29f43c711cdb9fa6988f24fe5123dd91ef8e0ede4c2ec2a456dc9a
          • Instruction ID: ec319743ba999b14c5b36b7db05a41e1a9341160322eae14b836442ef7f3742e
          • Opcode Fuzzy Hash: 61ec7acb2f29f43c711cdb9fa6988f24fe5123dd91ef8e0ede4c2ec2a456dc9a
          • Instruction Fuzzy Hash: DBA01230701200DB43118F319A0434C76E8655518170180345000C0220DA2440004A08
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 3a49be35e42ad91bd8ae451549b3abc82ae36c2bad44d9dc37428738df5aac6a
          • Instruction ID: e1cf9e6faf36b8add5926323722615d690e454bc73e106785dde56bdd673a75a
          • Opcode Fuzzy Hash: 3a49be35e42ad91bd8ae451549b3abc82ae36c2bad44d9dc37428738df5aac6a
          • Instruction Fuzzy Hash: 07324421D29F014DD7239635D822336A68CAFB73D4F15CB37F81AB5AA6EB39C4930109
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
          • Instruction ID: 48e740e85c0ba13e9a39178d6675e0207deff7deda563336be704961b392fadd
          • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
          • Instruction Fuzzy Hash: BB112EB728004243E614CA2DC5B45B7A796EFC6324B2E437BD0439B7D4D63FD565AE08
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6fd100cc5fbd715ecb011839e5036f548278fb3c62fe5b5825335654aac5a513
          • Instruction ID: 6e0bbde72fb14e28d293faa79a21a47684c70f3d5d039a1569678be7d820ba02
          • Opcode Fuzzy Hash: 6fd100cc5fbd715ecb011839e5036f548278fb3c62fe5b5825335654aac5a513
          • Instruction Fuzzy Hash: 1CF0A035704604AFCB14CF24D994F2AB7E8FB09B10F1082BEE81ACB7D0DB79A801CA44

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 209 411396-4113aa 210 411418-411420 209->210 211 4113ac-4113b1 209->211 213 411422-411425 210->213 214 411467-41147f call 411509 210->214 211->210 212 4113b3-4113b8 211->212 212->210 215 4113ba-4113bd 212->215 213->214 217 411427-411464 call 40a0d4 * 4 213->217 223 411482-411489 214->223 215->210 218 4113bf-4113c7 215->218 217->214 221 4113e1-4113e9 218->221 222 4113c9-4113cc 218->222 228 411403-411417 call 40a0d4 * 2 221->228 229 4113eb-4113ee 221->229 222->221 225 4113ce-4113e0 call 40a0d4 call 411092 222->225 226 4114a8-4114ac 223->226 227 41148b-41148f 223->227 225->221 237 4114c4-4114d0 226->237 238 4114ae-4114b3 226->238 233 411491-411494 227->233 234 4114a5 227->234 228->210 229->228 235 4113f0-411402 call 40a0d4 call 411190 229->235 233->234 242 411496-4114a4 call 40a0d4 * 2 233->242 234->226 235->228 237->223 240 4114d2-4114df call 40a0d4 237->240 245 4114c1 238->245 246 4114b5-4114b8 238->246 242->234 245->237 246->245 253 4114ba-4114c0 call 40a0d4 246->253 253->245
          APIs
          • ___free_lconv_mon.LIBCMT ref: 004113DA
            • Part of subcall function 00411092: _free.LIBCMT ref: 004110AF
            • Part of subcall function 00411092: _free.LIBCMT ref: 004110C1
            • Part of subcall function 00411092: _free.LIBCMT ref: 004110D3
            • Part of subcall function 00411092: _free.LIBCMT ref: 004110E5
            • Part of subcall function 00411092: _free.LIBCMT ref: 004110F7
            • Part of subcall function 00411092: _free.LIBCMT ref: 00411109
            • Part of subcall function 00411092: _free.LIBCMT ref: 0041111B
            • Part of subcall function 00411092: _free.LIBCMT ref: 0041112D
            • Part of subcall function 00411092: _free.LIBCMT ref: 0041113F
            • Part of subcall function 00411092: _free.LIBCMT ref: 00411151
            • Part of subcall function 00411092: _free.LIBCMT ref: 00411163
            • Part of subcall function 00411092: _free.LIBCMT ref: 00411175
            • Part of subcall function 00411092: _free.LIBCMT ref: 00411187
          • _free.LIBCMT ref: 004113CF
            • Part of subcall function 0040A0D4: HeapFree.KERNEL32(00000000,00000000,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?), ref: 0040A0EA
            • Part of subcall function 0040A0D4: GetLastError.KERNEL32(?,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?,?), ref: 0040A0FC
          • _free.LIBCMT ref: 004113F1
          • _free.LIBCMT ref: 00411406
          • _free.LIBCMT ref: 00411411
          • _free.LIBCMT ref: 00411433
          • _free.LIBCMT ref: 00411446
          • _free.LIBCMT ref: 00411454
          • _free.LIBCMT ref: 0041145F
          • _free.LIBCMT ref: 00411497
          • _free.LIBCMT ref: 0041149E
          • _free.LIBCMT ref: 004114BB
          • _free.LIBCMT ref: 004114D3
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
          • String ID:
          • API String ID: 161543041-0
          • Opcode ID: 6948097937a93bc79f347b0239b9d3e03f7c2ed127d1936b30172035711646f9
          • Instruction ID: c3e3b1c69a3f208cfc80e5f5fa68dd56a74046792277ba31cc9222323f4b6648
          • Opcode Fuzzy Hash: 6948097937a93bc79f347b0239b9d3e03f7c2ed127d1936b30172035711646f9
          • Instruction Fuzzy Hash: C4316D326043099EEB309F7AD845B9B73E8AF00714F15442FE259E76A1DB3DAC90D729

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 266 40bbe8-40bbf9 267 40bc05-40bc90 call 40a0d4 * 9 call 40baae call 40bafe 266->267 268 40bbfb-40bc04 call 40a0d4 266->268 268->267
          APIs
          • _free.LIBCMT ref: 0040BBFC
            • Part of subcall function 0040A0D4: HeapFree.KERNEL32(00000000,00000000,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?), ref: 0040A0EA
            • Part of subcall function 0040A0D4: GetLastError.KERNEL32(?,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?,?), ref: 0040A0FC
          • _free.LIBCMT ref: 0040BC08
          • _free.LIBCMT ref: 0040BC13
          • _free.LIBCMT ref: 0040BC1E
          • _free.LIBCMT ref: 0040BC29
          • _free.LIBCMT ref: 0040BC34
          • _free.LIBCMT ref: 0040BC3F
          • _free.LIBCMT ref: 0040BC4A
          • _free.LIBCMT ref: 0040BC55
          • _free.LIBCMT ref: 0040BC63
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: a67545f4090f87f4ce43d628bc50666b59a916dea7e958812169f1c9f9eab329
          • Instruction ID: 48553cfbb76d33e2d3673e81f8a837f49d6e368abddba18f1e8eacc9daa22871
          • Opcode Fuzzy Hash: a67545f4090f87f4ce43d628bc50666b59a916dea7e958812169f1c9f9eab329
          • Instruction Fuzzy Hash: 6B11A77611424CEFCF01EF96C842CD97B65EF04354B1140AABA085B262DB3BDE60EB89

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 293 410bff-410c0d 294 410c1f-410c32 call 407060 293->294 295 410c0f-410c1d call 409a86 293->295 301 410c82-410c87 call 409a86 294->301 302 410c34-410c36 294->302 300 410c9b-410c9f 295->300 308 410c8d 301->308 302->301 303 410c38-410c4e 302->303 306 410c50-410c5c call 410e3a 303->306 307 410c62-410c66 303->307 306->307 310 410cfa-410d0f call 410eeb 307->310 311 410c6c-410c6f 307->311 312 410c90-410c9a call 40a0d4 308->312 323 410d11-410d13 310->323 324 410d59-410d5c 310->324 315 410c71-410c77 311->315 316 410ca0-410ca2 311->316 312->300 315->316 321 410c79-410c80 call 40acf1 315->321 319 410ca4-410ca6 316->319 320 410ca8-410caa 316->320 319->312 325 410cac call 409fb1 320->325 321->301 334 410cf0 321->334 323->324 328 410d15-410d24 call 40a0d4 323->328 324->312 327 410d62-410d6c 324->327 329 410cb1-410cc7 call 40a0d4 325->329 327->308 331 410d72-410d78 327->331 340 410d26-410d2e 328->340 341 410d38-410d3b 328->341 329->308 342 410cc9-410ccf 329->342 331->308 336 410d7e-410d94 call 410f4a call 40a0d4 331->336 335 410cf6-410cf8 334->335 335->308 335->310 336->308 359 410d9a-410da5 336->359 344 410daf-410db2 340->344 346 410d30-410d37 341->346 347 410d3d-410d55 call 410f4a call 40a0d4 341->347 342->335 345 410cd1-410cd3 342->345 344->312 348 410db8-410dba 344->348 351 410cd5 call 409fb1 345->351 346->341 347->344 365 410d57 347->365 353 410dbd-410dc2 348->353 352 410cda-410cee call 40a0d4 351->352 352->308 352->334 353->353 357 410dc4-410dcc 353->357 361 410dcf call 409fb1 357->361 363 410da9 359->363 364 410dd4-410dda 361->364 363->344 366 410e23-410e2a call 40a0d4 364->366 367 410ddc-410ded call 409317 364->367 365->363 366->312 372 410e2f 367->372 373 410def-410e13 SetEnvironmentVariableA 367->373 374 410e34 call 409568 372->374 373->366 375 410e15-410e1d call 409a86 373->375 376 410e39 374->376 375->366
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
          • String ID:
          • API String ID: 1282221369-0
          • Opcode ID: 0c7fa12dbec1ef7520115cce65805f1284c8e539b35b5cadf8115085c372d76b
          • Instruction ID: bd5c10ff3c59d4f406f930c3cde5030183181efdbd96f99f595e2c86a631d60a
          • Opcode Fuzzy Hash: 0c7fa12dbec1ef7520115cce65805f1284c8e539b35b5cadf8115085c372d76b
          • Instruction Fuzzy Hash: 7E612871A04301AFDB38AF7598417AA77A4AF01314F1442BFF944A7381E6BD99C18B9D

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 379 4038e0-403929 380 40392b-40392d 379->380 381 40392f 379->381 382 403931-40393b GetFileAttributesW 380->382 381->382 383 403bd0-403be9 call 401820 382->383 384 403941-403943 382->384 387 403bee-403c0b call 404b16 383->387 384->383 386 403949-40397f call 401270 call 4041c0 384->386 394 403981-40398f call 401c70 386->394 395 403994-4039be call 4011a0 386->395 394->395 399 4039c0-4039e7 call 401820 395->399 400 403a05-403a09 395->400 399->387 408 4039ed-403a00 call 401c70 399->408 402 403a0b-403a0d 400->402 403 403a0f 400->403 404 403a11-403a1b GetFileAttributesW 402->404 403->404 406 403a21-403a23 404->406 407 403b92-403bb9 call 401820 404->407 406->407 409 403a29-403a2d 406->409 407->387 416 403bbb-403bce call 401c70 407->416 408->387 412 403a31-403a42 LoadLibraryW 409->412 413 403a2f 409->413 417 403a44-403a63 call 401820 call 401410 412->417 418 403a68-403aa6 call 401820 GetProcAddress 412->418 413->412 416->387 417->387 426 403b65-403b90 FreeLibrary call 401450 call 401410 * 2 418->426 427 403aac-403ab0 418->427 426->387 430 403ab2-403ab4 427->430 431 403ab6 427->431 432 403ab8-403aff call 4025c0 call 409317 430->432 431->432 443 403b01-403b30 call 4024a0 call 402d10 call 401410 432->443 444 403b4a-403b55 call 403f60 432->444 447 403b5a-403b60 call 401530 443->447 454 403b32-403b3a 443->454 444->447 447->426 454->447 455 403b3c-403b48 call 401820 454->455 455->447
          APIs
          • GetFileAttributesW.KERNEL32(?,264E9466), ref: 00403932
          • GetFileAttributesW.KERNEL32(00000000), ref: 00403A12
          • LoadLibraryW.KERNEL32 ref: 00403A32
          • GetProcAddress.KERNEL32(00000000,ShowEngineChoice), ref: 00403A98
          • FreeLibrary.KERNEL32(00000000), ref: 00403B66
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: AttributesFileLibrary$AddressFreeLoadProc
          • String ID: Builds\$ShowEngineChoice
          • API String ID: 1170010538-1704591504
          • Opcode ID: 05081c2cd0ad7e37283d0b5abf5e49dd46763fc5f060554cd6a7b137e7f9392f
          • Instruction ID: de1ddf5754e0430927df7d71477b2fb86df1c92578392477b91780301d0b4d69
          • Opcode Fuzzy Hash: 05081c2cd0ad7e37283d0b5abf5e49dd46763fc5f060554cd6a7b137e7f9392f
          • Instruction Fuzzy Hash: C28191709042149BCB20DF25CD45BDABBB8AF45319F1006BEE419B72E1DB78AF44CB99

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 458 4030e0-40316e 459 403170-403172 458->459 460 403174 458->460 461 403176-4031ad 459->461 460->461 462 4031b0-4031e2 call 401720 RegOpenKeyExW 461->462 465 403222-403228 462->465 466 4031e4-403218 RegQueryValueExW 462->466 465->462 469 40322a 465->469 467 40321a-403220 RegCloseKey 466->467 468 40322f-403237 466->468 467->465 471 403239-40323b 468->471 472 40323d-403243 468->472 470 4032cf-4032d3 469->470 473 4032d9-403303 call 401270 call 404050 470->473 474 40345e-403467 470->474 475 403255-40327d call 401720 call 401270 471->475 476 403246-40324f 472->476 500 403381-40338a 473->500 501 403305-40330b 473->501 477 4034c0-4034dd call 404b16 474->477 478 403469-403475 474->478 504 403289-403296 475->504 505 40327f-403284 call 401820 475->505 476->476 480 403251-403253 476->480 482 403477 call 40954b 478->482 483 40347c-403483 478->483 480->475 482->483 488 403485-40348c 483->488 489 4034b7-4034bd call 404d59 483->489 494 403493-403498 488->494 495 40348e call 40954b 488->495 489->477 502 40349a call 40954b 494->502 503 40349f-4034a4 494->503 495->494 506 4033e3-403409 500->506 507 40338c-403398 500->507 508 403318-40332a 501->508 509 40330d-403313 call 401c70 501->509 502->503 512 4034a6 call 40954b 503->512 513 4034ab-4034ae 503->513 514 403298-4032a6 call 401c70 504->514 515 4032ab-4032b2 504->515 505->504 506->474 522 40340b-403417 506->522 517 40339a call 40954b 507->517 518 40339f-4033a6 507->518 520 403330 508->520 521 40332c-40332e 508->521 509->508 512->513 525 4034b0 call 40954b 513->525 526 4034b5 513->526 514->515 515->470 516 4032b4-4032c9 SetCurrentDirectoryW 515->516 516->470 517->518 529 4033a8-4033af 518->529 530 4033da-4033e0 call 404d59 518->530 531 403332-40333b 520->531 521->531 532 403419 call 40954b 522->532 533 40341e-403425 522->533 525->526 526->489 537 4033b1 call 40954b 529->537 538 4033b6-4033bb 529->538 530->506 539 403354-403358 531->539 540 40333d-403343 531->540 532->533 534 403455-40345b call 404d59 533->534 535 403427-40342a 533->535 534->474 542 403431-403436 535->542 543 40342c call 40954b 535->543 537->538 548 4033c2-4033c7 538->548 549 4033bd call 40954b 538->549 544 40335a-403378 539->544 540->544 550 403345-403352 call 405a30 540->550 556 403438 call 40954b 542->556 557 40343d-403442 542->557 543->542 558 40337a 544->558 559 40337c-40337e 544->559 554 4033c9 call 40954b 548->554 555 4033ce-4033d1 548->555 549->548 550->544 554->555 563 4033d3 call 40954b 555->563 564 4033d8 555->564 556->557 566 403444 call 40954b 557->566 567 403449-40344c 557->567 558->559 559->500 563->564 564->530 566->567 570 403453 567->570 571 40344e call 40954b 567->571 570->534 571->570
          APIs
          • RegOpenKeyExW.ADVAPI32(80000001,Software\Image-Line\Shared\Paths,00000000,00020019,?,0041F3E0,00000000,264E9466), ref: 004031DA
          • RegQueryValueExW.ADVAPI32(?,FL Studio engine,00000000,?,?,?), ref: 00403210
          • RegCloseKey.ADVAPI32(?), ref: 00403220
          • SetCurrentDirectoryW.KERNEL32(?,00000000,-00000002), ref: 004032C9
          Strings
          • FL Studio engine, xrefs: 00403205
          • Software\Image-Line\Shared\Paths, xrefs: 004031CE
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: CloseCurrentDirectoryOpenQueryValue
          • String ID: FL Studio engine$Software\Image-Line\Shared\Paths
          • API String ID: 560107024-3045882576
          • Opcode ID: 1ae0359c2a9daeafde217d5f520328ae5fb480cd08f2ba52420d0b095b6717eb
          • Instruction ID: d9aca2f66e9e14c5e08ca7a59a44d8ca8ae13f807f69bbcddbd0e91051e932eb
          • Opcode Fuzzy Hash: 1ae0359c2a9daeafde217d5f520328ae5fb480cd08f2ba52420d0b095b6717eb
          • Instruction Fuzzy Hash: 1DB1B3709002149BDB25EF25DC8879EBAB4EF05309F1006BEE41AE72D1DB789F84CB59

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 573 4034e0-40356e 574 403570-403572 573->574 575 403574 573->575 576 403576-4035ad 574->576 575->576 577 4035b0-4035e2 call 401720 RegOpenKeyExW 576->577 580 403622-403628 577->580 581 4035e4-403618 RegQueryValueExW 577->581 580->577 584 40362a 580->584 582 40361a-403620 RegCloseKey 581->582 583 40362f-403637 581->583 582->580 586 403639-40363b 583->586 587 40363d-403643 583->587 585 4036cf-4036d3 584->585 588 4036d9-403703 call 4041c0 call 404130 585->588 589 40385e-403867 585->589 590 403655-40367d call 401720 call 401270 586->590 591 403646-40364f 587->591 615 403781-40378a 588->615 616 403705-40370b 588->616 592 4038c0-4038dd call 404b16 589->592 593 403869-403875 589->593 619 403689-403696 590->619 620 40367f-403684 call 401820 590->620 591->591 595 403651-403653 591->595 597 403877 call 40954b 593->597 598 40387c-403883 593->598 595->590 597->598 603 403885-40388c 598->603 604 4038b7-4038bd call 404d59 598->604 609 403893-403898 603->609 610 40388e call 40954b 603->610 604->592 617 40389a call 40954b 609->617 618 40389f-4038a4 609->618 610->609 625 4037e3-403809 615->625 626 40378c-403798 615->626 627 403718-40372a 616->627 628 40370d-403713 call 401c70 616->628 617->618 621 4038a6 call 40954b 618->621 622 4038ab-4038ae 618->622 623 403698-4036a6 call 401c70 619->623 624 4036ab-4036b2 619->624 620->619 621->622 634 4038b0 call 40954b 622->634 635 4038b5 622->635 623->624 624->585 636 4036b4-4036c9 SetCurrentDirectoryW 624->636 625->589 631 40380b-403817 625->631 637 40379a call 40954b 626->637 638 40379f-4037a6 626->638 640 403730 627->640 641 40372c-40372e 627->641 628->627 643 403819 call 40954b 631->643 644 40381e-403825 631->644 634->635 635->604 636->585 637->638 647 4037a8-4037af 638->647 648 4037da-4037e0 call 404d59 638->648 642 403732-40373b 640->642 641->642 651 403754-403758 642->651 652 40373d-403743 642->652 643->644 654 403855-40385b call 404d59 644->654 655 403827-40382a 644->655 649 4037b1 call 40954b 647->649 650 4037b6-4037bb 647->650 648->625 649->650 659 4037c2-4037c7 650->659 660 4037bd call 40954b 650->660 662 40375a-403778 651->662 661 403745-403752 call 405a30 652->661 652->662 654->589 663 403831-403836 655->663 664 40382c call 40954b 655->664 669 4037c9 call 40954b 659->669 670 4037ce-4037d1 659->670 660->659 661->662 672 40377a 662->672 673 40377c-40377e 662->673 674 403838 call 40954b 663->674 675 40383d-403842 663->675 664->663 669->670 678 4037d3 call 40954b 670->678 679 4037d8 670->679 672->673 673->615 674->675 681 403844 call 40954b 675->681 682 403849-40384c 675->682 678->679 679->648 681->682 685 403853 682->685 686 40384e call 40954b 682->686 685->654 686->685
          APIs
          • RegOpenKeyExW.ADVAPI32(80000001,Software\Image-Line\Shared\Paths,00000000,00020019,?,0041F3E0,00000000,264E9466), ref: 004035DA
          • RegQueryValueExW.ADVAPI32(?,Shared DLLs,00000000,?,?,?), ref: 00403610
          • RegCloseKey.ADVAPI32(?), ref: 00403620
          • SetCurrentDirectoryW.KERNEL32(?,00000000,-00000002), ref: 004036C9
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: CloseCurrentDirectoryOpenQueryValue
          • String ID: Shared DLLs$Software\Image-Line\Shared\Paths
          • API String ID: 560107024-15047795
          • Opcode ID: fb2951c57167801161c0f0967db5a3139c012f4da95c761b7b7e4a9da19dd4cf
          • Instruction ID: 6e996c8f710392308a9c9457fb9a5c140fb766d7203bd62eeb12cb5959cd522a
          • Opcode Fuzzy Hash: fb2951c57167801161c0f0967db5a3139c012f4da95c761b7b7e4a9da19dd4cf
          • Instruction Fuzzy Hash: DCB1B3B19002149ADB24AF25CC8879DBBB5EF05309F1046BEE41AE32D1D779AF84CF59

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 688 413dd6-413e08 689 413e0a-413e17 call 40a0b8 688->689 690 413e2c-413e2f 688->690 693 413e18-413e1d 689->693 692 413e31-413e33 690->692 690->693 694 41406a-41407d call 404b16 692->694 696 413e38-413e3b 693->696 697 413e1f-413e2a call 40a0b8 693->697 696->692 698 413e3d-413e42 696->698 697->698 701 413e44-413e4c 698->701 702 413e4f-413e51 698->702 701->702 705 413e53-413e55 702->705 706 413e5b-413e5d 702->706 705->706 707 413ef8-413f10 MultiByteToWideChar 705->707 708 413e67-413e6a 706->708 709 413e5f 706->709 707->692 713 413f16-413f22 707->713 711 413e74-413e77 708->711 712 413e6c-413e6f 708->712 710 413e61-413e62 709->710 710->694 716 413e79-413e7b 711->716 717 413e7d-413e8a GetCPInfo 711->717 712->694 714 413f24-413f35 713->714 715 413f7d-413f7f 713->715 718 413f57-413f5d 714->718 719 413f37-413f49 call 405410 714->719 720 413f82-413f84 715->720 716->710 717->692 721 413e8c-413e8e 717->721 723 413f5e call 409b44 718->723 725 41405e 719->725 735 413f4f-413f55 719->735 724 413f8a-413fa0 MultiByteToWideChar 720->724 720->725 726 413e90-413e96 721->726 727 413ebf-413ec1 721->727 731 413f63-413f69 723->731 724->725 732 413fa6-413fba MultiByteToWideChar 724->732 729 414061-414068 call 404af8 725->729 726->716 733 413e98-413e9f 726->733 727->707 730 413ec3-413ec9 727->730 729->694 730->712 737 413ecb-413ed2 730->737 731->725 738 413f6f 731->738 732->725 739 413fc0-413fcc 732->739 733->716 734 413ea1-413ea6 733->734 734->716 740 413ea8-413eac 734->740 741 413f75-413f7b 735->741 737->712 743 413ed4 737->743 738->741 744 414018 739->744 745 413fce-413fdf 739->745 748 413eb6-413ebb 740->748 749 413eae-413eb0 740->749 741->720 750 413ed7-413edc 743->750 751 41401a-41401c 744->751 746 413fe1-413ff0 call 405410 745->746 747 413ffa-414000 745->747 756 414052 746->756 765 413ff2-413ff8 746->765 754 414001 call 409b44 747->754 748->734 753 413ebd 748->753 749->694 749->748 750->712 755 413ede-413ee2 750->755 751->756 757 41401e-414033 MultiByteToWideChar 751->757 753->716 760 414006-41400b 754->760 761 413ee4-413ee6 755->761 762 413eec-413ef1 755->762 758 414055-41405c call 404af8 756->758 757->756 763 414035-414050 call 40c552 757->763 758->729 760->756 766 41400d 760->766 761->694 761->762 762->750 767 413ef3 762->767 763->758 770 414013-414016 765->770 766->770 767->712 770->751
          APIs
          • GetCPInfo.KERNEL32(?,?), ref: 00413E82
          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00413F05
          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00413F98
          • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00413FAF
            • Part of subcall function 00409B44: HeapAlloc.KERNEL32(00000000,?,?,?,004071B5,?,?,?,?,?,0040232D,00404584,?,?,00404584), ref: 00409B76
          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0041402B
          • __freea.LIBCMT ref: 00414056
          • __freea.LIBCMT ref: 00414062
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ByteCharMultiWide$__freea$AllocHeapInfo
          • String ID:
          • API String ID: 2171645-0
          • Opcode ID: 8ca8590afd9faeddc56944c5881a59f4c9234a53216bebeb6f83dead52eff06f
          • Instruction ID: 5165c60ab54c1a2ed8f89255d6defbb5e83309102b0ac90782e38da0fcb7c16f
          • Opcode Fuzzy Hash: 8ca8590afd9faeddc56944c5881a59f4c9234a53216bebeb6f83dead52eff06f
          • Instruction Fuzzy Hash: 4991D372E003169ADF209F65C841AEFBBB5AF49710F14416BE915E7280D739DDC1CBA8

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 772 41305d-4130ba GetConsoleCP 773 4130c0-4130dc 772->773 774 4131fd-41320f call 404b16 772->774 776 4130f7-413108 call 40a00e 773->776 777 4130de-4130f5 773->777 783 41310a-41310d 776->783 784 41312e-413130 776->784 779 413131-413140 call 40b950 777->779 779->774 788 413146-413166 WideCharToMultiByte 779->788 786 413113-413125 call 40b950 783->786 787 4131d4-4131f3 783->787 784->779 786->774 794 41312b-41312c 786->794 787->774 788->774 790 41316c-413182 WriteFile 788->790 792 4131f5-4131fb GetLastError 790->792 793 413184-413195 790->793 792->774 793->774 795 413197-41319b 793->795 794->788 796 4131c9-4131cc 795->796 797 41319d-4131bb WriteFile 795->797 796->773 798 4131d2 796->798 797->792 799 4131bd-4131c1 797->799 798->774 799->774 800 4131c3-4131c6 799->800 800->796
          APIs
          • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,004137D2,?,00000000,?,00000000,00000000), ref: 0041309F
          • __fassign.LIBCMT ref: 0041311A
          • __fassign.LIBCMT ref: 00413135
          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 0041315B
          • WriteFile.KERNEL32(?,?,00000000,004137D2,00000000,?,?,?,?,?,?,?,?,?,004137D2,?), ref: 0041317A
          • WriteFile.KERNEL32(?,?,00000001,004137D2,00000000,?,?,?,?,?,?,?,?,?,004137D2,?), ref: 004131B3
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
          • String ID:
          • API String ID: 1324828854-0
          • Opcode ID: a85cf005042ee24a6171e8d11dee10c11e382f092748e9716315bae38fe722a0
          • Instruction ID: 65771749660f6c082f4e6d3f597a9b1f5a1b1864e1e77bfea480567eba9dd0f9
          • Opcode Fuzzy Hash: a85cf005042ee24a6171e8d11dee10c11e382f092748e9716315bae38fe722a0
          • Instruction Fuzzy Hash: 6851B770A00249AFCB10CFA8D885AEEBBF8FF49301F14412BE955E7251D7349A85CB69

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 801 402f40-402f9c 802 402fa2 801->802 803 402f9e-402fa0 801->803 804 402fa4-402fad GetModuleHandleW 802->804 803->804 805 403043-403058 GetFileAttributesW 804->805 806 402fb3-402fb8 804->806 809 40305a-40305c 805->809 810 40305e-403063 805->810 807 402fc6-402ff0 call 401720 call 403fb0 806->807 808 402fba-402fc1 call 401820 806->808 826 402ff2-403004 call 401820 807->826 827 403024-40303e call 4026f0 call 402820 807->827 808->807 809->810 812 403071-40308b LoadLibraryW 809->812 810->812 813 403065-40306c call 401820 810->813 817 40309a-4030b4 812->817 818 40308d-403095 call 401c70 812->818 813->812 821 4030c3-4030de call 404b16 817->821 822 4030b6-4030be call 401c70 817->822 818->817 822->821 833 403010-403020 826->833 834 403006-40300b call 404593 826->834 827->805 833->827 834->833
          APIs
          • GetModuleHandleW.KERNEL32(?,264E9466,?,00000000,?), ref: 00402FA5
          • GetFileAttributesW.KERNEL32(?,?,264E9466,?,00000000,?), ref: 0040304F
          • LoadLibraryW.KERNEL32(?,?,264E9466,?,00000000,?), ref: 0040307D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: AttributesFileHandleLibraryLoadModule
          • String ID: .$_Copy$invalid string position
          • API String ID: 1874533835-1464509366
          • Opcode ID: 23fd22305333a2dffd62d6d05f13bcd70c23ccd8230bfd74617236fc908f2af0
          • Instruction ID: da98474bcf906f3713c5a1b78ce9558ec3c932553f14ae375e9e04e96a442bc2
          • Opcode Fuzzy Hash: 23fd22305333a2dffd62d6d05f13bcd70c23ccd8230bfd74617236fc908f2af0
          • Instruction Fuzzy Hash: 79513C71A04208DACF10DFA5C945BDEBBB8EF49725F50062AE411F32D0DB789A45CBA9
          APIs
            • Part of subcall function 004111F9: _free.LIBCMT ref: 00411222
          • _free.LIBCMT ref: 00411283
            • Part of subcall function 0040A0D4: HeapFree.KERNEL32(00000000,00000000,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?), ref: 0040A0EA
            • Part of subcall function 0040A0D4: GetLastError.KERNEL32(?,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?,?), ref: 0040A0FC
          • _free.LIBCMT ref: 0041128E
          • _free.LIBCMT ref: 00411299
          • _free.LIBCMT ref: 004112ED
          • _free.LIBCMT ref: 004112F8
          • _free.LIBCMT ref: 00411303
          • _free.LIBCMT ref: 0041130E
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: 06ec6540e438d8a09da536fd41d3305855b7a1539a34de379467d2ff3c042619
          • Instruction ID: a198fd2adebaaea5243515d9bd3843b1f186d145754a35d40907218dcc2e8f84
          • Opcode Fuzzy Hash: 06ec6540e438d8a09da536fd41d3305855b7a1539a34de379467d2ff3c042619
          • Instruction Fuzzy Hash: EA115172540B0CBAD530BBB2CC07FCBB79D5F08708F40082EB399660A2EA7DB5995755
          APIs
          • GetLastError.KERNEL32(?,?,0040838F,00406BC4,00420530,00000010,0040638C,?,?,?,?,?,00000000,?), ref: 004083A6
          • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 004083B4
          • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004083CD
          • SetLastError.KERNEL32(00000000,0040838F,00406BC4,00420530,00000010,0040638C,?,?,?,?,?,00000000,?), ref: 0040841F
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ErrorLastValue___vcrt_
          • String ID:
          • API String ID: 3852720340-0
          • Opcode ID: fc9d39874cf7a0374f305b0c494e64ddacde0b3903fe0cc47774a9f2a3145668
          • Instruction ID: c7df93d7cb5514c336b5a9696235fa9f61e0383ab9539d8bf0fc0785b5252b12
          • Opcode Fuzzy Hash: fc9d39874cf7a0374f305b0c494e64ddacde0b3903fe0cc47774a9f2a3145668
          • Instruction Fuzzy Hash: 8D0128322193267ED6342B75BE85B572A85EB457B8360023FF650B51E1FFB94C02D14C
          APIs
          • _free.LIBCMT ref: 0040B1D3
            • Part of subcall function 0040A0D4: HeapFree.KERNEL32(00000000,00000000,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?), ref: 0040A0EA
            • Part of subcall function 0040A0D4: GetLastError.KERNEL32(?,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?,?), ref: 0040A0FC
          • _free.LIBCMT ref: 0040B1E5
          • _free.LIBCMT ref: 0040B1F8
          • _free.LIBCMT ref: 0040B209
          • _free.LIBCMT ref: 0040B21A
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID: `&B
          • API String ID: 776569668-3969561002
          • Opcode ID: 0ed04a65c61fe898eda77a51e80066cf5da9dab8517b67f1d56b517782923a2e
          • Instruction ID: 4e99f16235664ee9690e38a68369d1690a2d3ec36046c759a6a1aae0f7f62b60
          • Opcode Fuzzy Hash: 0ed04a65c61fe898eda77a51e80066cf5da9dab8517b67f1d56b517782923a2e
          • Instruction Fuzzy Hash: B2F0BDB1A00365ABCA35BF25AC414057BB0F704765385823BF915662A1CB7D4B539FCE
          APIs
          • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,?,?,?,?,?,?,0040D236,?,?,00000003), ref: 0040D03F
          • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,?,?,?,0040D236,?,?,00000003), ref: 0040D0C5
          • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,00000003,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0040D1BF
          • __freea.LIBCMT ref: 0040D1CC
            • Part of subcall function 00409B44: HeapAlloc.KERNEL32(00000000,?,?,?,004071B5,?,?,?,?,?,0040232D,00404584,?,?,00404584), ref: 00409B76
          • __freea.LIBCMT ref: 0040D1D5
          • __freea.LIBCMT ref: 0040D1FA
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ByteCharMultiWide__freea$AllocHeap
          • String ID:
          • API String ID: 3147120248-0
          • Opcode ID: fe2f76ddb0a38e4701cb7393f5050f0a23a0184b85804567e5e93c2d4de6b396
          • Instruction ID: c34399926ba55bb14d524fc379ded5b759b3dbadcd7def488aa6283d5fea1d61
          • Opcode Fuzzy Hash: fe2f76ddb0a38e4701cb7393f5050f0a23a0184b85804567e5e93c2d4de6b396
          • Instruction Fuzzy Hash: 38510672A10206ABDB259FA4CC41EAB77A9EF44754F14423AFD05EB2C0DF38DC45C668
          APIs
          • GetLastError.KERNEL32(?,?,0040B52C,00420718,0000000C,00405687), ref: 0040BCE0
          • _free.LIBCMT ref: 0040BD13
          • _free.LIBCMT ref: 0040BD3B
          • SetLastError.KERNEL32(00000000), ref: 0040BD48
          • SetLastError.KERNEL32(00000000), ref: 0040BD54
          • _abort.LIBCMT ref: 0040BD5A
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ErrorLast$_free$_abort
          • String ID:
          • API String ID: 3160817290-0
          • Opcode ID: aaf42687d7ffc606aaba6098ffb8d9e52b7e460a829c4a14b4e6d953c0badaef
          • Instruction ID: d242a3280e4ea0b848bb2f7007f2209fb6fbd24f2431a98af98647f32c8e44aa
          • Opcode Fuzzy Hash: aaf42687d7ffc606aaba6098ffb8d9e52b7e460a829c4a14b4e6d953c0badaef
          • Instruction Fuzzy Hash: 9FF0F43224460577C2223726AC06FAB6626DFC1775F25053FFA04B22E1EF3D890251EE
          APIs
          • GetFileAttributesW.KERNEL32(?,00423970,00000000,000000FF,264E9466,?,?,?,00402B96), ref: 00402C84
          • LoadLibraryW.KERNEL32(?,?,?,?,00402B96), ref: 00402CA1
          • GetProcAddress.KERNEL32(00000000,RunReWirePanel), ref: 00402CB3
          • FreeLibrary.KERNEL32(00000000,?,?,?,00402B96), ref: 00402CC5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Library$AddressAttributesFileFreeLoadProc
          • String ID: RunReWirePanel
          • API String ID: 4029741490-963473013
          • Opcode ID: 220b0ec9b74f5377be93692210716a78e0baf94325efc65548a8830abfc54b7b
          • Instruction ID: 6488b852996bd16dc08019f971c11e20d719507276cb5ee2635e9c964b462d1f
          • Opcode Fuzzy Hash: 220b0ec9b74f5377be93692210716a78e0baf94325efc65548a8830abfc54b7b
          • Instruction Fuzzy Hash: 03316031A04209DBDF14DFA4C959BEEB7B4AF09324F64153AE411B32D0D7B85985CAA8
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _wcsrchr
          • String ID: .bat$.cmd$.com$.exe
          • API String ID: 1752292252-4019086052
          • Opcode ID: 3fc1bc48a4a7751d509f8da21a16398b1fd01de2a505bc3f2c14766ca8eb7738
          • Instruction ID: b6fd6605b743f34348d915e601607b4c9e83dd63d50c4e11f340ce731c974d97
          • Opcode Fuzzy Hash: 3fc1bc48a4a7751d509f8da21a16398b1fd01de2a505bc3f2c14766ca8eb7738
          • Instruction Fuzzy Hash: 76F06236249B1E75E9242519EE02ADB13894F427F9B28413FFC4CB55C2DE7D998180ED
          APIs
          • ___BuildCatchObject.LIBVCRUNTIME ref: 0040635E
            • Part of subcall function 00406996: ___AdjustPointer.LIBCMT ref: 004069E0
          • _UnwindNestedFrames.LIBCMT ref: 00406375
          • ___FrameUnwindToState.LIBVCRUNTIME ref: 00406387
          • CallCatchBlock.LIBVCRUNTIME ref: 004063AB
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
          • String ID: sg@
          • API String ID: 2633735394-4120294379
          • Opcode ID: 8e90f5c8eb9f3a8744cf03bb1354c1ea2422f4ef47fc7488f4a074b59a9dacde
          • Instruction ID: 7ef967dbf4a95b7153da8dbbdd964b51fe2c92b744254f5ec8080ae61ea075d1
          • Opcode Fuzzy Hash: 8e90f5c8eb9f3a8744cf03bb1354c1ea2422f4ef47fc7488f4a074b59a9dacde
          • Instruction Fuzzy Hash: C3010532400108BBCF126F65CC01EDA3BBAAF49754F06802AFD1976261D73AE9719BA5
          APIs
          • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0040A644,00000003,?,0040A5E4,00000003,00420690,0000000C,0040A6F7,00000003,00000002), ref: 0040A66F
          • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0040A682
          • FreeLibrary.KERNEL32(00000000,?,?,?,0040A644,00000003,?,0040A5E4,00000003,00420690,0000000C,0040A6F7,00000003,00000002,00000000), ref: 0040A6A5
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: AddressFreeHandleLibraryModuleProc
          • String ID: CorExitProcess$mscoree.dll
          • API String ID: 4061214504-1276376045
          • Opcode ID: 9795655132b294b6ed77200db63e4e31ac7cf582c90e3c5b5fe0bfbf990e9267
          • Instruction ID: be8922ad79e942b18d1a88a6f750b82ec20cc5b5b9de9d2dae1f796284c9d412
          • Opcode Fuzzy Hash: 9795655132b294b6ed77200db63e4e31ac7cf582c90e3c5b5fe0bfbf990e9267
          • Instruction Fuzzy Hash: 7BF04431A00608FBCB119F90EC19BDE7FB9EF48715F544075F805B2290DB755E50CA99
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free
          • String ID:
          • API String ID: 269201875-0
          • Opcode ID: 3560e30de7e155783c1a9f2f3b3d6e0cfae7312524d423a2823b58ec1579e24c
          • Instruction ID: 967c99f3be41bd8149f2bb0d9d15683302f605346b9f8901ce092a178fa2f6ff
          • Opcode Fuzzy Hash: 3560e30de7e155783c1a9f2f3b3d6e0cfae7312524d423a2823b58ec1579e24c
          • Instruction Fuzzy Hash: 5F41E272A003049FCB20DF79C881A5AB3A1EF85314F1546BEEA15EB381D735AD02CB89
          APIs
          • GetEnvironmentStringsW.KERNEL32 ref: 00410B85
          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00410BA8
            • Part of subcall function 00409B44: HeapAlloc.KERNEL32(00000000,?,?,?,004071B5,?,?,?,?,?,0040232D,00404584,?,?,00404584), ref: 00409B76
          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00410BCE
          • _free.LIBCMT ref: 00410BE1
          • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00410BF0
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ByteCharEnvironmentMultiStringsWide$AllocFreeHeap_free
          • String ID:
          • API String ID: 2278895681-0
          • Opcode ID: 72f072a49e6a99132a7dd3bc67e4ce666eec8761613f25c499fa7f45bf9d121a
          • Instruction ID: 7072b3659d0b35b431f8eaa513f3417bb5585d39fb516e420d80c14a405d6ff5
          • Opcode Fuzzy Hash: 72f072a49e6a99132a7dd3bc67e4ce666eec8761613f25c499fa7f45bf9d121a
          • Instruction Fuzzy Hash: 5301DD726096157F53211AF65C88CFFB96DDAC6B68314012BFD04D6200DAA8DC8291B9
          APIs
          • GetLastError.KERNEL32(?,?,?,00409A8B,004092D8,?,?,004011CD,?,00000104), ref: 0040BD65
          • _free.LIBCMT ref: 0040BD9A
          • _free.LIBCMT ref: 0040BDC1
          • SetLastError.KERNEL32(00000000,?,00000104), ref: 0040BDCE
          • SetLastError.KERNEL32(00000000,?,00000104), ref: 0040BDD7
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ErrorLast$_free
          • String ID:
          • API String ID: 3170660625-0
          • Opcode ID: 4d9a13b72cfb8bdc8503e8d19b78d9f9c5aa16ee63b4d681031bd9953bcf6a87
          • Instruction ID: 5f25117c7d9b84b57ede9dfdc4567d6e7c743e31f630e51f5ba88c824c8e2162
          • Opcode Fuzzy Hash: 4d9a13b72cfb8bdc8503e8d19b78d9f9c5aa16ee63b4d681031bd9953bcf6a87
          • Instruction Fuzzy Hash: AC01F432240600A7C2226B766C85E6BB62AEFC2375765013BFA45B22D1EF7DCC0251ED
          APIs
          • _free.LIBCMT ref: 004111A8
            • Part of subcall function 0040A0D4: HeapFree.KERNEL32(00000000,00000000,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?), ref: 0040A0EA
            • Part of subcall function 0040A0D4: GetLastError.KERNEL32(?,?,00411227,?,00000000,?,00000000,?,0041124E,?,00000007,?,?,0041152E,?,?), ref: 0040A0FC
          • _free.LIBCMT ref: 004111BA
          • _free.LIBCMT ref: 004111CC
          • _free.LIBCMT ref: 004111DE
          • _free.LIBCMT ref: 004111F0
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free$ErrorFreeHeapLast
          • String ID:
          • API String ID: 776569668-0
          • Opcode ID: e276703debc424d4533bb6ceaeff71e8c48d78241a5b77186f15e6f34d36433b
          • Instruction ID: 7699969ecc13d64f9ba09c80e80d2a7e0edb06926d064be52e5d13629556f3ac
          • Opcode Fuzzy Hash: e276703debc424d4533bb6ceaeff71e8c48d78241a5b77186f15e6f34d36433b
          • Instruction Fuzzy Hash: 88F04F33609214BBC630DF69E981C57B3E9AA04710799081BF708E7A50CA3DFCD0CA6C
          APIs
          • GetFileAttributesW.KERNEL32(?), ref: 00403D86
          • GetFileAttributesW.KERNEL32(?), ref: 00403DD3
          • GetProcAddress.KERNEL32(?,CreateFruityInstance), ref: 00403EE2
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: AttributesFile$AddressProc
          • String ID: CreateFruityInstance
          • API String ID: 2889150381-2634520518
          • Opcode ID: ac4b3991accd802ed1f897dbbea405be1db5e01a4f39e51f889860a9f754d976
          • Instruction ID: 4cb94eefa489964be5470bc5a27681c6cc97bd475849e9c1abb26d40f1a8a8b6
          • Opcode Fuzzy Hash: ac4b3991accd802ed1f897dbbea405be1db5e01a4f39e51f889860a9f754d976
          • Instruction Fuzzy Hash: C7A14C71D041089ADF14DFA5D985BDEBBB4EF05318F20822AE425B72E1DB786E05CB68
          APIs
            • Part of subcall function 0040BCDC: GetLastError.KERNEL32(?,?,0040B52C,00420718,0000000C,00405687), ref: 0040BCE0
            • Part of subcall function 0040BCDC: _free.LIBCMT ref: 0040BD13
            • Part of subcall function 0040BCDC: SetLastError.KERNEL32(00000000), ref: 0040BD54
            • Part of subcall function 0040BCDC: _abort.LIBCMT ref: 0040BD5A
            • Part of subcall function 00410818: _abort.LIBCMT ref: 0041084A
            • Part of subcall function 00410818: _free.LIBCMT ref: 0041087E
            • Part of subcall function 0041048D: GetOEMCP.KERNEL32(?,?,00410716,?), ref: 004104B8
          • _free.LIBCMT ref: 00410771
          • _free.LIBCMT ref: 004107A7
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: _free$ErrorLast_abort
          • String ID: `&B$`&B
          • API String ID: 2991157371-3650563656
          • Opcode ID: fac1b13765be351bc9d0e2134d85f0770d243abb3d8c7740635effb4b965b36d
          • Instruction ID: d447fda578f830014105bb406eef1840afa64cc3a1d2e87cdf6ab03ded19286b
          • Opcode Fuzzy Hash: fac1b13765be351bc9d0e2134d85f0770d243abb3d8c7740635effb4b965b36d
          • Instruction Fuzzy Hash: E531C431904208AFDB11EBA5D441BAA77E4EF40324F2540AFE5145B2D1DBBA6DC1CF98
          APIs
          • std::_Xinvalid_argument.LIBCPMT ref: 00402918
          • std::_Xinvalid_argument.LIBCPMT ref: 00402922
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Xinvalid_argumentstd::_
          • String ID: invalid string position$string too long
          • API String ID: 909987262-4289949731
          • Opcode ID: c64b15007395dea2f36aca86ee3c211cfd551fdf6133d12655906c35363bfebf
          • Instruction ID: 984dc0c0b2cd398f35e6645f1bc5f04e18c9dbf1703626bb7c3d1d18387ae337
          • Opcode Fuzzy Hash: c64b15007395dea2f36aca86ee3c211cfd551fdf6133d12655906c35363bfebf
          • Instruction Fuzzy Hash: C6D05B7434030CB78A046997DCC2C85725C5E4D750720043BBF14E71C685B89E84416E
          APIs
          • GetFileType.KERNEL32(?,?,00000000,00000000), ref: 00408A32
            • Part of subcall function 00408DB7: __dosmaperr.LIBCMT ref: 00408DFA
          • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0040893B), ref: 00408B5D
          • __dosmaperr.LIBCMT ref: 00408B64
          • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000), ref: 00408BA1
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: __dosmaperr$ErrorFileLastNamedPeekPipeType
          • String ID:
          • API String ID: 3955570002-0
          • Opcode ID: 4e17df2c825c0cc79ffa86c79776fe878e0bb5644ae6caaa7de0a9e25d9e925e
          • Instruction ID: a909cdaeb501b666b60ba36f2f7d5ecf36db804fe9db59e3ae2361878b55f0a5
          • Opcode Fuzzy Hash: 4e17df2c825c0cc79ffa86c79776fe878e0bb5644ae6caaa7de0a9e25d9e925e
          • Instruction Fuzzy Hash: 7751A5B29006089FDB14DFB5CD41AAFB7F9EF48314B14493EF595E32A0DB38A8418B54
          APIs
          • Concurrency::cancel_current_task.LIBCPMT ref: 00401F64
            • Part of subcall function 0040546F: __CxxThrowException@8.LIBVCRUNTIME ref: 00405486
          • Concurrency::cancel_current_task.LIBCPMT ref: 00401F79
          • new.LIBCMT ref: 00401F7F
          • new.LIBCMT ref: 00401F93
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Concurrency::cancel_current_task$Exception@8Throw
          • String ID:
          • API String ID: 3339364867-0
          • Opcode ID: b30e87919e1801eb3aa18b99a79989427a97fc347df8e849dbd210b43705568c
          • Instruction ID: bbac019b23ec9bba76f5c1b94f47a20e7e4d8badd3f71ac4ad78f24a1a322c6f
          • Opcode Fuzzy Hash: b30e87919e1801eb3aa18b99a79989427a97fc347df8e849dbd210b43705568c
          • Instruction Fuzzy Hash: 5741D271A006029BC724DF29D981A2AB7E9EB45354B10063FE456E73E0E778E905C76A
          APIs
          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000,?,?,?,004095C4,00000001,?,?,00000001,?,004096F7), ref: 0040F19E
          • MultiByteToWideChar.KERNEL32(?,00000001,?,00000001,00000000,00000001,?,?,?,004095C4,00000001,?,?,00000001,?,004096F7), ref: 0040F227
          • GetStringTypeW.KERNEL32(?,00000000,00000000,004095C4,?,?,?,004095C4,00000001,?,?,00000001,?,004096F7,?,00000001), ref: 0040F239
          • __freea.LIBCMT ref: 0040F242
            • Part of subcall function 00409B44: HeapAlloc.KERNEL32(00000000,?,?,?,004071B5,?,?,?,?,?,0040232D,00404584,?,?,00404584), ref: 00409B76
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ByteCharMultiWide$AllocHeapStringType__freea
          • String ID:
          • API String ID: 573072132-0
          • Opcode ID: 77f54d69b030fc0044ea9aa385975c4f8fe243b4312b8d35308b85528f3bfee1
          • Instruction ID: 512b04379e6a838b32722feee948c7acc3d8876ca6f5dddda010fddc36e9784c
          • Opcode Fuzzy Hash: 77f54d69b030fc0044ea9aa385975c4f8fe243b4312b8d35308b85528f3bfee1
          • Instruction Fuzzy Hash: C431CE32A0020AABDB259FA5CC45EEF7BA5EB40314B04417EEC04E6291E739DC94CB94
          APIs
          • FileTimeToSystemTime.KERNEL32(00000000,?,?,?,00000000,00000000,000000FF,?,?,00000000), ref: 00408BF7
          • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00408C0B
          • GetLastError.KERNEL32 ref: 00408C53
          • __dosmaperr.LIBCMT ref: 00408C5A
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Time$System$ErrorFileLastLocalSpecific__dosmaperr
          • String ID:
          • API String ID: 593088924-0
          • Opcode ID: 66ba25885fa02358f6a7470c051f6b3c8e8451d13ea520a3d931c7a08a5a69d3
          • Instruction ID: 8bb1349c06974e399ddb389eb7fbc4732d969f13515852d7df73d17925f9181a
          • Opcode Fuzzy Hash: 66ba25885fa02358f6a7470c051f6b3c8e8451d13ea520a3d931c7a08a5a69d3
          • Instruction Fuzzy Hash: 2B21DE7290510CAFDB10DFA1C985ADF77BCAB48310F50427AE516E61D0EF38EA458B65
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 7ee55be628356674c7006fafc0f87ded411dfc50adabf559d6154b96a4732128
          • Instruction ID: 5e43adfb19449af6642c75d7455ad3a127005c9fc59d7de8b8feeff0835e8e3f
          • Opcode Fuzzy Hash: 7ee55be628356674c7006fafc0f87ded411dfc50adabf559d6154b96a4732128
          • Instruction Fuzzy Hash: 5B01BCB220931A7EF6301A786CC1E6B725DDB503B8B21033BB621612C4DA7C8C21916A
          APIs
          • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00000000,00000000,?,0040C47E,?,00000000,00000000,00000000,?,0040C6EF,00000006,FlsSetValue), ref: 0040C509
          • GetLastError.KERNEL32(?,0040C47E,?,00000000,00000000,00000000,?,0040C6EF,00000006,FlsSetValue,00419F20,00419F28,00000000,00000364,?,0040BDAE), ref: 0040C515
          • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0040C47E,?,00000000,00000000,00000000,?,0040C6EF,00000006,FlsSetValue,00419F20,00419F28,00000000), ref: 0040C523
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: LibraryLoad$ErrorLast
          • String ID:
          • API String ID: 3177248105-0
          • Opcode ID: 65987c33a4870a61ec0d88cfa2783c5b4bcde42e3c776262c33830971a0c1e51
          • Instruction ID: 6380d94804746b704030005758720c13e73b28941d8c184123fdba221520e63c
          • Opcode Fuzzy Hash: 65987c33a4870a61ec0d88cfa2783c5b4bcde42e3c776262c33830971a0c1e51
          • Instruction Fuzzy Hash: F801FC36611632FBC7214BADAC84AA73BA8AF497A17114731F905F72C0D734F901C6E8
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: ac2c024898f4b245a35f12b7cce9795117e1af5b522237a5aa5cd6410490a6cb
          • Instruction ID: 599de7a54721eb8155e436ef4736af534507c2350c8ac348b7faf381059bf985
          • Opcode Fuzzy Hash: ac2c024898f4b245a35f12b7cce9795117e1af5b522237a5aa5cd6410490a6cb
          • Instruction Fuzzy Hash: 7DF027F36042041BD708E3B4A917E6F32888B74318704023FF61AE26C1F539D864855E
          APIs
          • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 00408128
          • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 0040812D
          • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 00408132
            • Part of subcall function 004084E9: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 004084FA
          • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 00408147
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
          • String ID:
          • API String ID: 1761009282-0
          • Opcode ID: 4620ded051c162a4ab368f0813539878333b42ab7183a8981c68f5926920f08c
          • Instruction ID: 0feefd6e7a9dcf97134fbbcdd833eb7569e1ded764c4512838079dcd10bc9bae
          • Opcode Fuzzy Hash: 4620ded051c162a4ab368f0813539878333b42ab7183a8981c68f5926920f08c
          • Instruction Fuzzy Hash: 31C0027401461360DC503A721B421AA17402D623DDBD020BFE8C53A5C37D3D040B512F
          APIs
          • __startOneArgErrorHandling.LIBCMT ref: 00409DBD
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ErrorHandling__start
          • String ID: pow
          • API String ID: 3213639722-2276729525
          • Opcode ID: 89aae3a5647528a4d97b6ae6a42fabe9c956c69cb8fa3c9ac7f938d036d1b9a1
          • Instruction ID: 3eabbc112abf6287ad78030cf2cf251621e1beafa91c7b8843af6e1d8866db47
          • Opcode Fuzzy Hash: 89aae3a5647528a4d97b6ae6a42fabe9c956c69cb8fa3c9ac7f938d036d1b9a1
          • Instruction Fuzzy Hash: FD516D61A0910696DB117716C9413BB37A49F50701F208D7BF0D5623EAEB3D8CF5968F
          APIs
          • std::_Xinvalid_argument.LIBCPMT ref: 00402F25
          • std::_Xinvalid_argument.LIBCPMT ref: 00402F2F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Xinvalid_argumentstd::_
          • String ID: string too long
          • API String ID: 909987262-2556327735
          • Opcode ID: a904f873c3e27bc27a61258efc716a507fefc5f3dd25c960804420f830d219cd
          • Instruction ID: 85cd45213759bfd326ecc2e2a8360a1ab255e1e451396078c8cea420fa8a3e1a
          • Opcode Fuzzy Hash: a904f873c3e27bc27a61258efc716a507fefc5f3dd25c960804420f830d219cd
          • Instruction Fuzzy Hash: 2141E4313442008BC724DE58EA88927B3EAEB957113200A3FE542EB6D0DBB4EC05D7ED
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID:
          • String ID: string too long
          • API String ID: 0-2556327735
          • Opcode ID: 487aea21fec2e29eb2f7db7b9444a1c668b841a6d5bd1c0b54d7b458f09e6a87
          • Instruction ID: 6718b6c2107a5b23a342d503e1025e29147def940efdb10f1ca3366c28115f34
          • Opcode Fuzzy Hash: 487aea21fec2e29eb2f7db7b9444a1c668b841a6d5bd1c0b54d7b458f09e6a87
          • Instruction Fuzzy Hash: 8031D3363046008BCB349E5DEAC886BB3A9FF95711320453FE542E76D0D7B5A849C7AD
          APIs
          • std::_Xinvalid_argument.LIBCPMT ref: 00401C5B
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Xinvalid_argumentstd::_
          • String ID: invalid string position$string too long
          • API String ID: 909987262-4289949731
          • Opcode ID: 0b8ab227b915edf27cfca804e795f54def291a07adb0b180a46c7435900354b4
          • Instruction ID: 4350cead44ed5ab31cb3f3d539257fd7a892b7d14c681f0375fd391c803237d8
          • Opcode Fuzzy Hash: 0b8ab227b915edf27cfca804e795f54def291a07adb0b180a46c7435900354b4
          • Instruction Fuzzy Hash: 2E3105323043108BD7249E5DE880B57F7E9EB95761F10093FE6559B2D2D7B6E840C3A9
          APIs
          • std::_Xinvalid_argument.LIBCPMT ref: 00401935
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: Xinvalid_argumentstd::_
          • String ID: invalid string position$string too long
          • API String ID: 909987262-4289949731
          • Opcode ID: 9f2a7bfef2e2428048f2067e4509eecec52f7da7a1d745b31c79f9ad309d4b66
          • Instruction ID: b5c334c06d014f47bfb49e50dd55c9dee9af8ba5bc1378df0b1d42719fed28af
          • Opcode Fuzzy Hash: 9f2a7bfef2e2428048f2067e4509eecec52f7da7a1d745b31c79f9ad309d4b66
          • Instruction Fuzzy Hash: 9331CD33304314DBC724AE69E88085BF3E9EFD8B51320493FE546D72A0DB35AA54C7A9
          APIs
          • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00404B5A
          • ___raise_securityfailure.LIBCMT ref: 00404C41
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: FeaturePresentProcessor___raise_securityfailure
          • String ID: H,B
          • API String ID: 3761405300-539709048
          • Opcode ID: b4c04d99618068d419dedac5404ebb96b96e4fa82eb6cc16d85986644676f1a2
          • Instruction ID: 052c40b602ece88b5a8612764514d0a3388197a280e22c9e4c4cddb85fbb46e9
          • Opcode Fuzzy Hash: b4c04d99618068d419dedac5404ebb96b96e4fa82eb6cc16d85986644676f1a2
          • Instruction Fuzzy Hash: 7121C3B4660204AAD324CF19EE817557BA4AB48350FD0453AEA089A6B1D7F49593CF4D
          APIs
            • Part of subcall function 0040BCDC: GetLastError.KERNEL32(?,?,0040B52C,00420718,0000000C,00405687), ref: 0040BCE0
            • Part of subcall function 0040BCDC: _free.LIBCMT ref: 0040BD13
            • Part of subcall function 0040BCDC: SetLastError.KERNEL32(00000000), ref: 0040BD54
            • Part of subcall function 0040BCDC: _abort.LIBCMT ref: 0040BD5A
          • _abort.LIBCMT ref: 0041084A
          • _free.LIBCMT ref: 0041087E
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3526499671.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.3526483344.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526516611.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526531924.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526546684.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526564105.0000000000429000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.3526584572.0000000000444000.00000020.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_LisectAVT_2403002B_47.jbxd
          Similarity
          • API ID: ErrorLast_abort_free
          • String ID: `&B
          • API String ID: 289325740-3969561002
          • Opcode ID: 9d07433f83eae26126034b1a6cfac5b4998af9a3d26eff3265eea34d38613e45
          • Instruction ID: 4e49ab1c499d57525365d9bc9404fddb8aab5f4ad752d3df6904e89dc88b9448
          • Opcode Fuzzy Hash: 9d07433f83eae26126034b1a6cfac5b4998af9a3d26eff3265eea34d38613e45
          • Instruction Fuzzy Hash: FA015E32E05625EBC735BF59850169AB760BF04750B15422FE85463781CBBC69D28FCE