Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1518425
MD5:7a1336cb114d90e0f64b7d29f29bbda8
SHA1:c8fe455d1bc2e8117236b58c952fd920cc87f166
SHA256:ec92d229701dbcc7e54bc124c94e917c05adc13bdaba3a67e3e00180735ff888
Tags:exeuser-jstrosch
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Renames NTDLL to bypass HIPS
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Detected potential crypto function
Drops PE files
Enables debug privileges
Enables driver privileges
Enables security privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 5956 cmdline: "C:\Users\user\Desktop\file.exe" MD5: 7A1336CB114D90E0F64B7D29F29BBDA8)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://121.40.100.23:12616/down/2b4pI1hCJx7p.exeAvira URL Cloud: Label: malware
Source: file.exeReversingLabs: Detection: 86%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
Source: file.exeJoe Sandbox ML: detected

Compliance

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.10000000.4.unpack
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Binary string: devco n.pdbo source: file.exe
Source: Binary string: wntdll.pdbUGP source: file.exe, 00000000.00000003.2128212727.0000000002B58000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371663637.0000000002D03000.00000040.00000020.00020000.00000000.sdmp, 4db5eb.tmp.0.dr
Source: Binary string: wntdll.pdb source: file.exe, 00000000.00000003.2128212727.0000000002B58000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371663637.0000000002D03000.00000040.00000020.00020000.00000000.sdmp, 4db5eb.tmp.0.dr
Source: Binary string: wuser32.pdb source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371806602.0000000002EBA000.00000040.00000020.00020000.00000000.sdmp, 4db659.tmp.0.dr
Source: Binary string: DrvInDM U.pdbe source: file.exe
Source: Binary string: wuser32.pdbUGP source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371806602.0000000002EBA000.00000040.00000020.00020000.00000000.sdmp, 4db659.tmp.0.dr
Source: Binary string: devc@on.pdb source: file.exe
Source: file.exeString found in binary or memory: http://121.40.100.23/1.html
Source: file.exeString found in binary or memory: http://121.40.100.23:12616/down/2b4pI1hCJx7p.exe
Source: file.exeString found in binary or memory: http://121.40.100.23:12616/down/4IbByzd41Ya1.zip
Source: file.exeString found in binary or memory: http://121.40.100.23:12616/down/ZWLu16Av5FGr.txt
Source: file.exeString found in binary or memory: http://ocsp.t
Source: file.exeString found in binary or memory: http://sf.symc
Source: file.exeString found in binary or memory: http://ts-ocsp.ws.s
Source: file.exeString found in binary or memory: http://ts-ocsp.ws.symantec.
Source: file.exeString found in binary or memory: https://ww(w.v
Source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_8b205abc-2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401206 NtQueryInformationProcess,CloseHandle,0_2_00401206
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005062DB0_2_005062DB
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: Load DriverJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: SecurityJump to behavior
Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040157A appears 34 times
Source: 4db5eb.tmp.0.drStatic PE information: Resource name: RT_MESSAGETABLE type: PDP-11 separate I&D executable not stripped
Source: 4db5eb.tmp.0.drStatic PE information: No import functions for PE file found
Source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuser32j% vs file.exe
Source: file.exe, 00000000.00000002.3371663637.0000000002E30000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs file.exe
Source: file.exe, 00000000.00000002.3371806602.0000000002F62000.00000040.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameuser32j% vs file.exe
Source: file.exe, 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSkinH_EL.dll vs file.exe
Source: file.exe, 00000000.00000003.2128212727.0000000002C7B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs file.exe
Source: file.exe, 00000000.00000002.3371602045.0000000002A3D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSkinH_EL.dll vs file.exe
Source: file.exeBinary or memory string: OriginalFilenameSkinH_EL.dll vs file.exe
Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: 4db5eb.tmp.0.drBinary string: \Device\IPT[
Source: classification engineClassification label: mal76.evad.winEXE@1/2@0/0
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\4db5eb.tmpJump to behavior
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 86%
Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\user\Desktop\file.exeJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msvfw32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: avifil32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msacm32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winmmbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: d3d9.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dciman32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wintypes.dllJump to behavior
Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.exeStatic file information: File size 5603328 > 1048576
Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x37a000
Source: Binary string: devco n.pdbo source: file.exe
Source: Binary string: wntdll.pdbUGP source: file.exe, 00000000.00000003.2128212727.0000000002B58000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371663637.0000000002D03000.00000040.00000020.00020000.00000000.sdmp, 4db5eb.tmp.0.dr
Source: Binary string: wntdll.pdb source: file.exe, 00000000.00000003.2128212727.0000000002B58000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371663637.0000000002D03000.00000040.00000020.00020000.00000000.sdmp, 4db5eb.tmp.0.dr
Source: Binary string: wuser32.pdb source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371806602.0000000002EBA000.00000040.00000020.00020000.00000000.sdmp, 4db659.tmp.0.dr
Source: Binary string: DrvInDM U.pdbe source: file.exe
Source: Binary string: wuser32.pdbUGP source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371806602.0000000002EBA000.00000040.00000020.00020000.00000000.sdmp, 4db659.tmp.0.dr
Source: Binary string: devc@on.pdb source: file.exe

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.10000000.4.unpack
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007609D3 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007609D3
Source: 4db5eb.tmp.0.drStatic PE information: section name: RT
Source: 4db5eb.tmp.0.drStatic PE information: section name: .mrdata
Source: 4db5eb.tmp.0.drStatic PE information: section name: .00cfg
Source: 4db659.tmp.0.drStatic PE information: section name: .didat
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00754B7C push eax; ret 0_2_00754B9A
Source: 4db5eb.tmp.0.drStatic PE information: section name: .text entropy: 6.844715065913507
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\4db5eb.tmpJump to dropped file
Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\4db659.tmpJump to dropped file
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\ntdll.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4db5eb.tmpJump to dropped file
Source: C:\Users\user\Desktop\file.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\4db659.tmpJump to dropped file
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_005F509E GetSystemInfo,0_2_005F509E
Source: file.exe, 00000000.00000002.3371192702.0000000000ADE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_007609D3 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_007609D3
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
Source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371806602.0000000002EBA000.00000040.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371192702.0000000000ADE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
Source: file.exe, 00000000.00000002.3371192702.0000000000ADE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: GetProgmanWindowe
Source: file.exe, 00000000.00000002.3371192702.0000000000ADE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow\
Source: file.exe, 00000000.00000003.2128945599.0000000002B5E000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371806602.0000000002EBA000.00000040.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.3371192702.0000000000ADE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00772830 GetVersion,InitializeCriticalSection,0_2_00772830
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
LSASS Driver
1
Process Injection
1
Process Injection
11
Input Capture
1
Security Software Discovery
Remote Services11
Input Capture
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
1
LSASS Driver
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Process Discovery
Remote Desktop Protocol1
Archive Collected Data
Junk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
DLL Side-Loading
3
Obfuscated Files or Information
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
Software Packing
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe87%ReversingLabsWin32.Infostealer.Tinba
file.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Local\Temp\4db5eb.tmp0%ReversingLabs
C:\Users\user\AppData\Local\Temp\4db659.tmp0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ts-ocsp.ws.symantec.0%Avira URL Cloudsafe
http://sf.symc0%Avira URL Cloudsafe
http://121.40.100.23/1.html0%Avira URL Cloudsafe
http://121.40.100.23:12616/down/2b4pI1hCJx7p.exe100%Avira URL Cloudmalware
http://ocsp.t0%Avira URL Cloudsafe
http://ts-ocsp.ws.s0%Avira URL Cloudsafe
https://ww(w.v0%Avira URL Cloudsafe
http://121.40.100.23:12616/down/4IbByzd41Ya1.zip0%Avira URL Cloudsafe
http://121.40.100.23:12616/down/ZWLu16Av5FGr.txt0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://121.40.100.23/1.htmlfile.exefalse
  • Avira URL Cloud: safe
unknown
http://121.40.100.23:12616/down/4IbByzd41Ya1.zipfile.exefalse
  • Avira URL Cloud: safe
unknown
https://ww(w.vfile.exefalse
  • Avira URL Cloud: safe
unknown
http://ocsp.tfile.exefalse
  • Avira URL Cloud: safe
unknown
http://ts-ocsp.ws.sfile.exefalse
  • Avira URL Cloud: safe
unknown
http://121.40.100.23:12616/down/ZWLu16Av5FGr.txtfile.exefalse
  • Avira URL Cloud: safe
unknown
http://121.40.100.23:12616/down/2b4pI1hCJx7p.exefile.exefalse
  • Avira URL Cloud: malware
unknown
http://ts-ocsp.ws.symantec.file.exefalse
  • Avira URL Cloud: safe
unknown
http://sf.symcfile.exefalse
  • Avira URL Cloud: safe
unknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1518425
Start date and time:2024-09-25 17:27:00 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal76.evad.winEXE@1/2@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
C:\Users\user\AppData\Local\Temp\4db659.tmpfile.exeGet hashmaliciousUnknownBrowse
    file.exeGet hashmaliciousUnknownBrowse
      FZ6oyLoqGM.exeGet hashmaliciousUnknownBrowse
        Lisect_AVT_24003_G1A_54.exeGet hashmaliciousBdaejecBrowse
          LisectAVT_2403002A_186.exeGet hashmaliciousUnknownBrowse
            zde6gdIB73.exeGet hashmaliciousUnknownBrowse
              SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllGet hashmaliciousUnknownBrowse
                SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllGet hashmaliciousUnknownBrowse
                  SecuriteInfo.com.Win32.DropperX-gen.25624.11389.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.Trojan.Siggen19.27544.4289.6649.exeGet hashmaliciousUnknownBrowse
                      C:\Users\user\AppData\Local\Temp\4db5eb.tmpfile.exeGet hashmaliciousUnknownBrowse
                        file.exeGet hashmaliciousUnknownBrowse
                          BCNFNjvJNq.exeGet hashmaliciousADWIND, Lokibot, Ramnit, SalityBrowse
                            cnlg48.exeGet hashmaliciousUnknownBrowse
                              Lisect_AVT_24003_G1A_54.exeGet hashmaliciousBdaejecBrowse
                                LisectAVT_2403002A_186.exeGet hashmaliciousUnknownBrowse
                                  zde6gdIB73.exeGet hashmaliciousUnknownBrowse
                                    SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllGet hashmaliciousUnknownBrowse
                                      SecuriteInfo.com.Win32.Evo-gen.28674.10592.dllGet hashmaliciousUnknownBrowse
                                        SecuriteInfo.com.Win32.DropperX-gen.25624.11389.exeGet hashmaliciousUnknownBrowse
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):1699896
                                          Entropy (8bit):6.290547513916722
                                          Encrypted:false
                                          SSDEEP:24576:0Na0qyFU/vb313JPCGucMBbruVALdpNQHKl3y9UfSj6HYZY8zCixcq:kFU3b3HucMBbrb/qj98deCNq
                                          MD5:5564A98A4692BA8B2D25770FB834D5F6
                                          SHA1:129D030D817F6B25D1FDEF2CAD33EB81DE1DEA8B
                                          SHA-256:28AB9A0F5F50FD5398324B5EC099F5C53C6FAA701C3F6D8B0B3DA47A76C56230
                                          SHA-512:D803E2E3425095E170910103A4470C598FD4A9A10C1217A006A6393CD1ECA06D1C628E845F6FD1071F1C92778D481F47E4E5F175005FEC2CB0A7519C90992858
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: BCNFNjvJNq.exe, Detection: malicious, Browse
                                          • Filename: cnlg48.exe, Detection: malicious, Browse
                                          • Filename: Lisect_AVT_24003_G1A_54.exe, Detection: malicious, Browse
                                          • Filename: LisectAVT_2403002A_186.exe, Detection: malicious, Browse
                                          • Filename: zde6gdIB73.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win32.DropperX-gen.25624.11389.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-.=FizS.izS.izS.2.P.jzS.}.S.hzS.}.P./zS.}.].q{S.}.V.rzS.}.W..zS.}...hzS.}.Q.hzS.RichizS.........................PE..L..................!.........................0....(K.........................@......,.....@A............................U...............................8`.......Q..0z..p............................................................................text...%........................... ..`RT.................................. ..`PAGE....:.... ...................... ..`.data....Z...0......................@....mrdata.x#.......$..................@....00cfg...............:..............@..@.rsrc................<..............@..@.reloc...Q.......R...>..............@..B................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):1679648
                                          Entropy (8bit):5.3288490918902225
                                          Encrypted:false
                                          SSDEEP:24576:nB79uCigstmh6JVZ3et1NtJJBwuCx59U4IgL5pc6:JXh2LeXJBwuOTU4I56
                                          MD5:2E8AB67DC55089DFBCBFA7710BD15B07
                                          SHA1:159434853CE512029314C6B70070220D251A924A
                                          SHA-256:2BCC4FD8A4D3C4033A81702E1B685860BE78D6F1A7E980F2E7593C59656F2706
                                          SHA-512:7898B7B48685A2079BC77210464C448025E5BECB25EDDF3FB612A320B627FDB45AFF12D4913ADA98524E2C4718D74E911CE007F4DE6E3F2BB7184CDFAC5A0E5F
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: file.exe, Detection: malicious, Browse
                                          • Filename: FZ6oyLoqGM.exe, Detection: malicious, Browse
                                          • Filename: Lisect_AVT_24003_G1A_54.exe, Detection: malicious, Browse
                                          • Filename: LisectAVT_2403002A_186.exe, Detection: malicious, Browse
                                          • Filename: zde6gdIB73.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win32.Evo-gen.28674.10592.dll, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Win32.DropperX-gen.25624.11389.exe, Detection: malicious, Browse
                                          • Filename: SecuriteInfo.com.Trojan.Siggen19.27544.4289.6649.exe, Detection: malicious, Browse
                                          Reputation:moderate, very likely benign file
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......l=..(\.H(\.H(\.H!$4Hd\.H<7.I!\.H(\.H)X.H<7.I)\.H<7.I!\.H<7.I.\.H<7.I'\.H<7XH)\.H<7.I)\.HRich(\.H........PE..L...-..?...........!.....0...:...............@.....i................................=.....@A............................(s..X...\.... ...............B.. _...@..$g.. Q..T...............................................L...<........................text...8/.......0.................. ..`.data....2...@.......4..............@....idata..`............<..............@..@.didat..x...........................@....rsrc........ ......................@..@.reloc..$g...@...h..................@..B........................................................................................................................................................................................................................................................................................
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.332202119447142
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.26%
                                          • UPX compressed Win32 Executable (30571/9) 0.30%
                                          • Win32 EXE Yoda's Crypter (26571/9) 0.26%
                                          • Visual Basic Script (13500/0) 0.13%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          File name:file.exe
                                          File size:5'603'328 bytes
                                          MD5:7a1336cb114d90e0f64b7d29f29bbda8
                                          SHA1:c8fe455d1bc2e8117236b58c952fd920cc87f166
                                          SHA256:ec92d229701dbcc7e54bc124c94e917c05adc13bdaba3a67e3e00180735ff888
                                          SHA512:9376a69c1cc17d478baa49a191e86a33a190397eba3ca7e11a772786c60d819ba70282dc1abc050d0680002cc8f2ac0eb98335cf266e74bcce214254164b1aa8
                                          SSDEEP:98304:mKgVAhl+8ewKd249PMCVe9kCh7bT8Y5D3dV4JM8jUCYHMR1HLqZBYMg:mKgVAhl+8id249PMCVe9kCh7bT8Y5D3m
                                          TLSH:B1464A23B152C061E50515B015A0DB382E763AB86C7E86AFFBF0DDA57DB08B1C7B261D
                                          File Content Preview:MZ......................@...................................@...........!..L.!This program cannot be run in DOS mode....$.......a...%..F%..F%..FJ..F,..FJ..F#..F^..F+..Fs..F...F...F'..F...F...F%..F...FG..F...F#..F$..F#..Fq..F...F$..F...FP..F6..F,..F...F...
                                          Icon Hash:66c4c44a6c668c72
                                          Entrypoint:0x750540
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:
                                          Time Stamp:0x66E98455 [Tue Sep 17 13:29:57 2024 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:14ac16b6ab41482a6dec812b524ddab4
                                          Instruction
                                          push ebp
                                          mov ebp, esp
                                          push FFFFFFFFh
                                          push 008674A0h
                                          push 00753EE4h
                                          mov eax, dword ptr fs:[00000000h]
                                          push eax
                                          mov dword ptr fs:[00000000h], esp
                                          sub esp, 58h
                                          push ebx
                                          push esi
                                          push edi
                                          mov dword ptr [ebp-18h], esp
                                          call dword ptr [0077B200h]
                                          xor edx, edx
                                          mov dl, ah
                                          mov dword ptr [009BF180h], edx
                                          mov ecx, eax
                                          and ecx, 000000FFh
                                          mov dword ptr [009BF17Ch], ecx
                                          shl ecx, 08h
                                          add ecx, edx
                                          mov dword ptr [009BF178h], ecx
                                          shr eax, 10h
                                          mov dword ptr [009BF174h], eax
                                          push 00000001h
                                          call 00007FD14CB220A4h
                                          pop ecx
                                          test eax, eax
                                          jne 00007FD14CB1A6CAh
                                          push 0000001Ch
                                          call 00007FD14CB1A788h
                                          pop ecx
                                          call 00007FD14CB21E4Fh
                                          test eax, eax
                                          jne 00007FD14CB1A6CAh
                                          push 00000010h
                                          call 00007FD14CB1A777h
                                          pop ecx
                                          xor esi, esi
                                          mov dword ptr [ebp-04h], esi
                                          call 00007FD14CB21C7Dh
                                          call dword ptr [0077B448h]
                                          mov dword ptr [009C4944h], eax
                                          call 00007FD14CB21B3Bh
                                          mov dword ptr [009BF0E0h], eax
                                          call 00007FD14CB218E4h
                                          call 00007FD14CB21826h
                                          call 00007FD14CB1EC76h
                                          mov dword ptr [ebp-30h], esi
                                          lea eax, dword ptr [ebp-5Ch]
                                          push eax
                                          call dword ptr [0077B2ACh]
                                          call 00007FD14CB217B7h
                                          mov dword ptr [ebp-64h], eax
                                          test byte ptr [ebp-30h], 00000001h
                                          je 00007FD14CB1A6C8h
                                          movzx eax, word ptr [ebp+00h]
                                          Programming Language:
                                          • [ C ] VS98 (6.0) SP6 build 8804
                                          • [C++] VS98 (6.0) SP6 build 8804
                                          • [C++] VS98 (6.0) build 8168
                                          • [ C ] VS98 (6.0) build 8168
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x4740580x190.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c50000x8aa8.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x37b0000x878.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x37944e0x37a000379a58168dfffa03660d8471fd03c823unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x37b0000xfbcf80xfc000f796a927937884ac8f7f460d90cd8d4fFalse0.5729941716269841data6.5988962951107135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x4770000x14d94a0xd80001c0120b524d300df6e961b24013b1b9cFalse0.5099973325376157data5.576805928304713IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x5c50000x8aa80x90007a253bdaf65e2c2df38c6fcf55188ed0False0.4484320746527778data5.885356181019409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          TEXTINCLUDE0x5c5f880xbASCII text, with no line terminatorsChineseChina1.7272727272727273
                                          TEXTINCLUDE0x5c5f940x16dataChineseChina1.3636363636363635
                                          TEXTINCLUDE0x5c5fac0x151C source, ASCII text, with CRLF line terminatorsChineseChina0.6201780415430267
                                          WAVE0x5c61000x1448RIFF (little-endian) data, WAVE audio, Microsoft PCM, 16 bit, stereo 22050 HzChineseChina0.8330123266563945
                                          RT_CURSOR0x5c75480x134dataChineseChina0.5811688311688312
                                          RT_CURSOR0x5c767c0x134Targa image data - Map 64 x 65536 x 1 +32 "\001"ChineseChina0.37662337662337664
                                          RT_CURSOR0x5c77b00x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"ChineseChina0.4805194805194805
                                          RT_CURSOR0x5c78e40xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"ChineseChina0.7
                                          RT_CURSOR0x5c79980x134AmigaOS bitmap font "(", fc_YSize 4294967292, 3840 elements, 2nd "\377\370\017\377\377\374\037\377\377\376?\377\377\377\177\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.32792207792207795
                                          RT_CURSOR0x5c7acc0x134AmigaOS bitmap font "(", fc_YSize 4294967288, 3840 elements, 2nd "\377\370\037\377\377\370\037\377\377\370\037\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdChineseChina0.3246753246753247
                                          RT_CURSOR0x5c7c000x134dataItalianItaly0.37012987012987014
                                          RT_CURSOR0x5c7d340x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"ItalianItaly0.5097402597402597
                                          RT_CURSOR0x5c7e680x134dataItalianItaly0.487012987012987
                                          RT_BITMAP0x5c7f9c0x1002Device independent bitmap graphic, 104 x 13 x 24, image size 4058, resolution 2834 x 2834 px/mChineseChina0.349194729136164
                                          RT_BITMAP0x5c8fa00x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.3598901098901099
                                          RT_BITMAP0x5c910c0x248Device independent bitmap graphic, 64 x 15 x 4, image size 480ChineseChina0.3407534246575342
                                          RT_BITMAP0x5c93540x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.4444444444444444
                                          RT_BITMAP0x5c94980x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.26453488372093026
                                          RT_BITMAP0x5c95f00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2616279069767442
                                          RT_BITMAP0x5c97480x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2441860465116279
                                          RT_BITMAP0x5c98a00x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.24709302325581395
                                          RT_BITMAP0x5c99f80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240, resolution 3780 x 3780 px/mChineseChina0.2238372093023256
                                          RT_BITMAP0x5c9b500x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.19476744186046513
                                          RT_BITMAP0x5c9ca80x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.20930232558139536
                                          RT_BITMAP0x5c9e000x158Device independent bitmap graphic, 20 x 20 x 4, image size 240ChineseChina0.18895348837209303
                                          RT_BITMAP0x5c9f580x5e4Device independent bitmap graphic, 70 x 39 x 4, image size 1404ChineseChina0.34615384615384615
                                          RT_BITMAP0x5ca53c0xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80ChineseChina0.44565217391304346
                                          RT_BITMAP0x5ca5f40x16cDevice independent bitmap graphic, 39 x 13 x 4, image size 260ChineseChina0.28296703296703296
                                          RT_BITMAP0x5ca7600x144Device independent bitmap graphic, 33 x 11 x 4, image size 220ChineseChina0.37962962962962965
                                          RT_ICON0x5ca8a40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640ChineseChina0.26344086021505375
                                          RT_ICON0x5cab8c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192ChineseChina0.41216216216216217
                                          RT_ICON0x5cacb40xc44Device independent bitmap graphic, 32 x 62 x 24, image size 3100, resolution 2835 x 2835 px/m0.9168789808917197
                                          RT_MENU0x5cb8f80xcdataChineseChina1.5
                                          RT_MENU0x5cb9040x284dataChineseChina0.5
                                          RT_DIALOG0x5cbb880x98dataChineseChina0.7171052631578947
                                          RT_DIALOG0x5cbc200x17adataChineseChina0.5185185185185185
                                          RT_DIALOG0x5cbd9c0xfadataChineseChina0.696
                                          RT_DIALOG0x5cbe980xeadataChineseChina0.6239316239316239
                                          RT_DIALOG0x5cbf840x8aedataChineseChina0.39603960396039606
                                          RT_DIALOG0x5cc8340xb2dataChineseChina0.7359550561797753
                                          RT_DIALOG0x5cc8e80xccdataChineseChina0.7647058823529411
                                          RT_DIALOG0x5cc9b40xb2dataChineseChina0.6629213483146067
                                          RT_DIALOG0x5cca680xe2dataChineseChina0.6637168141592921
                                          RT_DIALOG0x5ccb4c0x18cdataChineseChina0.5227272727272727
                                          RT_STRING0x5cccd80x50dataChineseChina0.85
                                          RT_STRING0x5ccd280x2cdataChineseChina0.5909090909090909
                                          RT_STRING0x5ccd540x78dataChineseChina0.925
                                          RT_STRING0x5ccdcc0x1c4dataChineseChina0.8141592920353983
                                          RT_STRING0x5ccf900x12adataChineseChina0.5201342281879194
                                          RT_STRING0x5cd0bc0x146dataChineseChina0.6288343558282209
                                          RT_STRING0x5cd2040x40dataChineseChina0.65625
                                          RT_STRING0x5cd2440x64dataChineseChina0.73
                                          RT_STRING0x5cd2a80x1d8dataChineseChina0.6758474576271186
                                          RT_STRING0x5cd4800x114dataChineseChina0.6376811594202898
                                          RT_STRING0x5cd5940x24dataChineseChina0.4444444444444444
                                          RT_GROUP_CURSOR0x5cd5b80x14dataChineseChina1.4
                                          RT_GROUP_CURSOR0x5cd5cc0x14dataChineseChina1.4
                                          RT_GROUP_CURSOR0x5cd5e00x14dataItalianItaly1.4
                                          RT_GROUP_CURSOR0x5cd5f40x14dataItalianItaly1.4
                                          RT_GROUP_CURSOR0x5cd6080x14dataItalianItaly1.4
                                          RT_GROUP_CURSOR0x5cd61c0x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                          RT_GROUP_CURSOR0x5cd6300x14Lotus unknown worksheet or configuration, revision 0x1ChineseChina1.25
                                          RT_GROUP_CURSOR0x5cd6440x22Lotus unknown worksheet or configuration, revision 0x2ChineseChina1.0294117647058822
                                          RT_GROUP_ICON0x5cd6680x14data1.25
                                          RT_GROUP_ICON0x5cd67c0x14dataChineseChina1.2
                                          RT_GROUP_ICON0x5cd6900x14dataChineseChina1.25
                                          RT_VERSION0x5cd6a40x234dataChineseChina0.5301418439716312
                                          RT_MANIFEST0x5cd8d80x1cdXML 1.0 document, ASCII text, with very long lines (461), with no line terminators0.5878524945770065
                                          DLLImport
                                          MSVFW32.dllDrawDibDraw
                                          AVIFIL32.dllAVIStreamGetFrame, AVIStreamInfoA
                                          iphlpapi.dllGetAdaptersInfo
                                          WINMM.dllwaveOutRestart, midiStreamRestart, midiStreamClose, midiOutReset, midiStreamStop, PlaySoundA, waveOutUnprepareHeader, waveOutPrepareHeader, waveOutWrite, waveOutPause, waveOutReset, waveOutClose, midiStreamOut, midiOutPrepareHeader, midiStreamProperty, midiStreamOpen, midiOutUnprepareHeader, waveOutOpen, waveOutGetNumDevs
                                          WS2_32.dllinet_addr, inet_ntoa, gethostbyname, WSAStartup, WSACleanup, select, send, closesocket, htons, socket, setsockopt, recvfrom, ioctlsocket, WSAAsyncSelect, connect, recv, getpeername, ntohl, WSAGetLastError, ntohs, getservbyname, shutdown, accept
                                          RASAPI32.dllRasGetConnectStatusA, RasHangUpA
                                          KERNEL32.dllGetTimeZoneInformation, GetLocaleInfoA, GetVersion, TerminateThread, CreateMutexA, ReleaseMutex, SuspendThread, InterlockedIncrement, InterlockedDecrement, MapViewOfFile, UnmapViewOfFile, GetSystemInfo, IsProcessorFeaturePresent, lstrcmpiA, SetNamedPipeHandleState, WaitNamedPipeA, OpenFileMappingA, OpenEventA, TlsAlloc, TlsFree, TlsSetValue, TlsGetValue, LocalFree, FileTimeToLocalFileTime, lstrcpynA, DuplicateHandle, FlushFileBuffers, LockFile, UnlockFile, SetEndOfFile, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, lstrcmpA, LocalAlloc, GlobalHandle, LocalReAlloc, GetFileTime, GetCurrentThread, GlobalFlags, SetErrorMode, GetProcessVersion, GetCPInfo, GetOEMCP, GetStartupInfoA, RtlUnwind, GetSystemTime, GetLocalTime, RaiseException, HeapSize, GetACP, SetStdHandle, GetFileType, UnhandledExceptionFilter, FreeEnvironmentStringsA, FreeEnvironmentStringsW, GetEnvironmentStrings, GetEnvironmentStringsW, SetHandleCount, GetStdHandle, GetEnvironmentVariableA, HeapDestroy, HeapCreate, VirtualFree, SetEnvironmentVariableW, SetEnvironmentVariableA, LCMapStringA, LCMapStringW, VirtualAlloc, IsBadWritePtr, SetUnhandledExceptionFilter, GetStringTypeA, GetStringTypeW, IsValidLocale, IsValidCodePage, EnumSystemLocalesA, CompareStringA, CompareStringW, IsBadReadPtr, IsBadCodePtr, GetLocaleInfoW, SetLastError, TerminateProcess, GetFileSize, SetFilePointer, GetCurrentProcess, GetWindowsDirectoryA, GetSystemDirectoryA, CreateSemaphoreA, ResumeThread, ReleaseSemaphore, EnterCriticalSection, LeaveCriticalSection, GetProfileStringA, WriteFile, WaitForMultipleObjects, CreateFileA, SetEvent, FindResourceA, LoadResource, LockResource, ReadFile, GetModuleFileNameA, WideCharToMultiByte, MultiByteToWideChar, GetCurrentThreadId, ExitProcess, GlobalSize, GlobalFree, DeleteCriticalSection, InitializeCriticalSection, lstrcatA, lstrlenA, WinExec, lstrcpyA, FindNextFileA, GetDriveTypeA, GlobalReAlloc, HeapFree, HeapReAlloc, GetProcessHeap, HeapAlloc, GetUserDefaultLCID, GetFullPathNameA, FreeLibrary, LoadLibraryA, GetLastError, GetVersionExA, WritePrivateProfileStringA, GetPrivateProfileStringA, CreateThread, CreateEventA, Sleep, ExpandEnvironmentStringsA, GlobalAlloc, GlobalLock, GlobalUnlock, FindFirstFileA, FindClose, GetFileAttributesA, DeleteFileA, GetCurrentDirectoryA, SetCurrentDirectoryA, GetVolumeInformationA, GetModuleHandleA, GetProcAddress, MulDiv, GetCommandLineA, GetTickCount, CreateProcessA, WaitForSingleObject, CloseHandle, InterlockedExchange, FileTimeToSystemTime
                                          USER32.dllGetSysColorBrush, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, CheckMenuItem, IsDialogMessageA, ScrollWindowEx, SendDlgItemMessageA, MapWindowPoints, AdjustWindowRectEx, GetScrollPos, RegisterClassA, GetClassLongA, RemovePropA, GetMessageTime, GetLastActivePopup, RegisterWindowMessageA, GetWindowPlacement, EndDialog, CreateDialogIndirectParamA, DestroyWindow, EndPaint, BeginPaint, CharUpperA, GetWindowTextLengthA, GetDlgItem, GetClassNameA, GetDesktopWindow, UnregisterHotKey, RegisterHotKey, CreateWindowExA, GetWindowTextA, SetWindowTextA, GetMenuItemCount, GetMenuItemID, GetMenuStringA, GetMenuState, GetTabbedTextExtentA, GrayStringA, TabbedTextOutA, WindowFromDC, EnumChildWindows, GetWindowDC, UnhookWindowsHookEx, CallNextHookEx, SetWindowsHookExA, GetPropA, MoveWindow, CallWindowProcA, SetPropA, DrawTextA, GetCursor, DrawStateA, FrameRect, GetNextDlgTabItem, GetForegroundWindow, LoadIconA, TranslateMessage, DrawFrameControl, DrawEdge, DrawFocusRect, WindowFromPoint, GetMessageA, DispatchMessageA, SetRectEmpty, CreateIconFromResourceEx, CreateIconFromResource, DrawIconEx, CreatePopupMenu, AppendMenuA, ModifyMenuA, CreateMenu, CreateAcceleratorTableA, GetDlgCtrlID, GetSubMenu, EnableMenuItem, ClientToScreen, EnumDisplaySettingsA, LoadImageA, SystemParametersInfoA, ShowWindow, IsWindowEnabled, TranslateAcceleratorA, GetKeyState, CopyAcceleratorTableA, PostQuitMessage, IsZoomed, GetClassInfoA, DefWindowProcA, GetSystemMenu, DeleteMenu, GetMenu, SetMenu, PeekMessageA, IsIconic, SetFocus, GetActiveWindow, GetWindow, DestroyAcceleratorTable, SetWindowRgn, GetMessagePos, ScreenToClient, ChildWindowFromPointEx, CopyRect, LoadBitmapA, WinHelpA, KillTimer, SetTimer, ReleaseCapture, GetCapture, SetCapture, GetScrollRange, SetScrollRange, SetScrollPos, SetRect, InflateRect, IntersectRect, DestroyIcon, PtInRect, OffsetRect, EnableWindow, RedrawWindow, GetWindowLongA, SetWindowLongA, GetSysColor, SetActiveWindow, SetCursorPos, LoadCursorA, SetCursor, GetDC, FillRect, IsRectEmpty, ReleaseDC, IsChild, TrackPopupMenu, DestroyMenu, SetForegroundWindow, GetWindowRect, EqualRect, UpdateWindow, ValidateRect, InvalidateRect, GetClientRect, GetFocus, GetParent, GetTopWindow, PostMessageA, IsWindow, SetParent, DestroyCursor, SendMessageA, SetWindowPos, MessageBoxA, GetCursorPos, GetSystemMetrics, EmptyClipboard, SetClipboardData, OpenClipboard, GetClipboardData, CloseClipboard, wsprintfA, WaitForInputIdle, LoadStringA, RegisterClipboardFormatA, IsWindowVisible, UnregisterClassA
                                          GDI32.dllFillRgn, CreateRectRgn, CombineRgn, PatBlt, CreatePen, SelectObject, CreatePatternBrush, CreateBitmap, CreateBrushIndirect, CreateDCA, CreateCompatibleBitmap, GetPolyFillMode, GetStretchBltMode, GetROP2, GetBkColor, GetBkMode, GetTextColor, CreateRoundRectRgn, CreateEllipticRgn, PathToRegion, EndPath, BeginPath, GetWindowOrgEx, GetViewportOrgEx, GetWindowExtEx, ExtTextOutA, Escape, TranslateCharsetInfo, CreateSolidBrush, SetPolyFillMode, SetROP2, SetMapMode, SetViewportOrgEx, OffsetViewportOrgEx, SetViewportExtEx, ScaleViewportExtEx, SetWindowExtEx, ScaleWindowExtEx, GetClipBox, ExcludeClipRect, CreateFontIndirectA, MoveToEx, LineTo, ExtSelectClipRgn, GetViewportExtEx, GetTextMetricsA, CreateFontA, SetDIBitsToDevice, SetTextColor, SetBkMode, TextOutA, SetBkColor, CreateRectRgnIndirect, CreateDIBSection, SetPixel, SetStretchBltMode, GetClipRgn, CreatePolygonRgn, SelectClipRgn, DeleteObject, CreateDIBitmap, GetSystemPaletteEntries, CreatePalette, StretchBlt, SelectPalette, RealizePalette, GetDIBits, RectVisible, PtVisible, CreatePenIndirect, RestoreDC, Ellipse, Rectangle, LPtoDP, DPtoLP, GetCurrentObject, RoundRect, SaveDC, SetWindowOrgEx, GetStockObject, GetObjectA, EndPage, EndDoc, DeleteDC, StartDocA, StartPage, BitBlt, GetPixel, CreateCompatibleDC, GetTextExtentPoint32A, SetPixelV, GetDeviceCaps
                                          MSIMG32.dllGradientFill
                                          WINSPOOL.DRVOpenPrinterA, DocumentPropertiesA, ClosePrinter
                                          comdlg32.dllChooseColorA, GetOpenFileNameA, GetSaveFileNameA, GetFileTitleA
                                          ADVAPI32.dllRegCreateKeyExA, RegOpenKeyA, RegQueryValueA, RegSetValueExA, RegOpenKeyExA, RegQueryValueExA, RegCloseKey, RegEnumValueA
                                          SHELL32.dllSHGetFileInfoA, DragAcceptFiles, DragFinish, ShellExecuteA, Shell_NotifyIconA, DragQueryFileA
                                          ole32.dllReleaseStgMedium, RevokeDragDrop, RegisterDragDrop, OleUninitialize, CLSIDFromString, CoCreateInstance, OleInitialize
                                          OLEAUT32.dllRegisterTypeLib, LoadTypeLib, UnRegisterTypeLib
                                          COMCTL32.dllImageList_DragLeave, ImageList_DragEnter, ImageList_Destroy, ImageList_Create, ImageList_BeginDrag, ImageList_Add, ImageList_DragMove, ImageList_Draw, _TrackMouseEvent, ImageList_SetBkColor, ImageList_GetImageCount, ImageList_GetImageInfo, ImageList_GetIcon, ImageList_DragShowNolock, ImageList_EndDrag, ImageList_Read, ImageList_DrawIndirect, ImageList_AddMasked, ImageList_Duplicate
                                          WLDAP32.dll
                                          WININET.dllInternetSetOptionA, InternetCrackUrlA, HttpOpenRequestA, HttpSendRequestA, HttpQueryInfoA, InternetReadFile, InternetOpenA, InternetCloseHandle, InternetConnectA, InternetCanonicalizeUrlA
                                          Language of compilation systemCountry where language is spokenMap
                                          ChineseChina
                                          ItalianItaly
                                          No network behavior found

                                          Click to jump to process

                                          Click to jump to process

                                          Target ID:0
                                          Start time:11:27:51
                                          Start date:25/09/2024
                                          Path:C:\Users\user\Desktop\file.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                          Imagebase:0x400000
                                          File size:5'603'328 bytes
                                          MD5 hash:7A1336CB114D90E0F64B7D29F29BBDA8
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:0.9%
                                            Dynamic/Decrypted Code Coverage:0%
                                            Signature Coverage:0%
                                            Total number of Nodes:110
                                            Total number of Limit Nodes:8
                                            execution_graph 71585 752177 71588 752189 71585->71588 71589 752186 71588->71589 71591 752190 71588->71591 71591->71589 71592 7521b5 71591->71592 71593 7521e2 71592->71593 71594 752294 RtlAllocateHeap 71593->71594 71595 752217 71593->71595 71594->71595 71595->71591 71711 758013 7 API calls 71677 757f7d HeapCreate 71678 757fd3 71677->71678 71679 757f9d 71677->71679 71680 757fac 71679->71680 71681 757fb9 71679->71681 71686 75b983 HeapAlloc 71680->71686 71683 757fd6 71681->71683 71685 757fc7 HeapDestroy 71681->71685 71684 757fb6 71684->71681 71685->71678 71686->71684 71687 5c9db4 71688 5c9dc5 71687->71688 71689 5c9dd0 71688->71689 71690 5c9df9 VirtualAlloc 71688->71690 71691 5c9e16 VirtualAlloc 71690->71691 71693 5c9e38 VirtualAlloc 71690->71693 71692 5c9e2e 71691->71692 71691->71693 71696 5c9e8c 71693->71696 71695 5c9f2c VirtualAlloc 71695->71696 71696->71695 71699 5c9f7b 71696->71699 71698 5ca112 71699->71698 71700 5ca164 71699->71700 71703 5ca173 71700->71703 71701 5ca260 71701->71698 71702 5ca239 VirtualProtect 71702->71703 71703->71701 71703->71702 71716 75129c RtlUnwind 71704 76d07d 71705 77159b 71704->71705 71706 76d083 LoadStringA 71705->71706 71707 76d09e 71706->71707 71718 757b7e 6 API calls 71714 75c0d9 VirtualAlloc 71715 7530c5 HeapAlloc 71596 5f300c 71597 5f301a 71596->71597 71598 5f305a VirtualAlloc 71597->71598 71599 5f301e 71597->71599 71600 5f3069 71598->71600 71601 5f316c 71603 5f317c 71601->71603 71602 5f3291 LoadLibraryA 71602->71603 71603->71602 71604 5f3182 71603->71604 71708 767442 8 API calls 71605 763a81 71608 76d50b 71605->71608 71609 76d516 71608->71609 71616 772447 SetErrorMode SetErrorMode 71609->71616 71612 763a96 71614 76d552 71627 772c6e 27 API calls 71614->71627 71617 77245e 71616->71617 71618 76d535 71617->71618 71628 76c251 71617->71628 71618->71614 71620 7671ef 71618->71620 71622 767204 71620->71622 71625 7671fb 71620->71625 71621 76720c 71667 750428 71621->71667 71622->71621 71624 76724b 71622->71624 71674 7670c3 RtlAllocateHeap 71624->71674 71625->71614 71627->71612 71629 76c256 71628->71629 71630 76c2ae 71629->71630 71636 771369 71629->71636 71630->71618 71634 76c28c 71645 771b23 71634->71645 71637 771b23 17 API calls 71636->71637 71638 76c262 GetCurrentThreadId SetWindowsHookExA 71637->71638 71639 771bb8 71638->71639 71640 771bc2 __EH_prolog 71639->71640 71641 771bf0 71640->71641 71654 7728c3 6 API calls 71640->71654 71641->71634 71644 771bd9 71655 772933 LeaveCriticalSection 71644->71655 71646 771b59 TlsGetValue 71645->71646 71651 771b2c 71645->71651 71647 771b6c 71646->71647 71649 771b93 71647->71649 71650 771b7f 71647->71650 71649->71630 71666 77192b 6 API calls 71650->71666 71656 7717bc EnterCriticalSection 71651->71656 71652 771b57 71652->71646 71654->71644 71655->71641 71661 7717db 71656->71661 71657 771897 71660 7718ac LeaveCriticalSection 71657->71660 71658 771815 GlobalAlloc 71662 77184a 71658->71662 71659 771828 GlobalHandle GlobalUnlock GlobalReAlloc 71659->71662 71660->71652 71661->71657 71661->71658 71661->71659 71663 771873 GlobalLock 71662->71663 71664 771858 GlobalHandle GlobalLock LeaveCriticalSection 71662->71664 71663->71657 71665 76449e 71664->71665 71665->71663 71666->71649 71675 754b7c 71667->71675 71669 750432 EnterCriticalSection 71670 750481 LeaveCriticalSection 71669->71670 71671 750450 71669->71671 71670->71625 71676 766b8a RtlAllocateHeap 71671->71676 71673 750462 71673->71670 71674->71625 71675->71669 71676->71673 71717 754082 RaiseException 71709 757a4c 13 API calls 71713 7672ea HeapFree VirtualFree VirtualFree HeapFree InterlockedDecrement 71710 75c028 HeapReAlloc HeapAlloc VirtualAlloc HeapFree 71720 754bc8 GetCurrentProcess TerminateProcess ExitProcess 71712 75440b RtlAllocateHeap

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 573 5f509e-5f5201 call 670d90 * 5 call 670da8 586 5f521a-5f5272 call 670d84 573->586 587 5f5203-5f5217 call 670d96 573->587 592 5f5274 586->592 593 5f5283-5f5289 586->593 587->586 596 5f5276-5f527a 592->596 594 5f528b 593->594 595 5f5290-5f52db call 670d8a 593->595 594->595 601 5f573d-5f5742 595->601 602 5f52e1-5f537b call 670d90 call 670da8 595->602 598 5f527c-5f527f 596->598 599 5f5281 596->599 598->596 599->593 603 5f5747-5f5781 call 670d8a * 4 601->603 610 5f5380-5f5383 602->610 612 5f539c-5f5454 call 670d8a call 670da8 610->612 613 5f5385-5f5399 call 670d96 610->613 624 5f546d-5f54b0 612->624 625 5f5456-5f546a call 670d96 612->625 613->612 627 5f54b6-5f54ba 624->627 628 5f54e2-5f54e6 624->628 625->624 630 5f54dd 627->630 631 5f54c0-5f54c4 627->631 632 5f54ec-5f54f0 628->632 633 5f55c0-5f55c4 628->633 638 5f5735-5f5738 630->638 636 5f54ca-5f54d1 631->636 637 5f54d6 631->637 639 5f54f6-5f5504 632->639 640 5f5521-5f5525 632->640 634 5f571a-5f571e 633->634 635 5f55ca-5f55ce 633->635 634->638 645 5f5724-5f5728 634->645 643 5f55d4-5f55db 635->643 644 5f55e0-5f55e4 635->644 636->630 637->630 638->603 646 5f550a-5f550f 639->646 647 5f5514 639->647 641 5f552b-5f5539 640->641 642 5f5556-5f555a 640->642 650 5f553f-5f5544 641->650 651 5f5549 641->651 654 5f558b-5f558f 642->654 655 5f5560-5f556e 642->655 652 5f5715 643->652 644->652 653 5f55ea-5f55ff call 670da8 644->653 645->638 648 5f572e 645->648 649 5f5519-5f551c 646->649 647->649 648->638 656 5f55bb 649->656 657 5f554e-5f5551 650->657 651->657 652->638 667 5f5618-5f561f 653->667 668 5f5601-5f5615 call 670d96 653->668 654->656 661 5f5595-5f55a3 654->661 659 5f557e 655->659 660 5f5574-5f5579 655->660 656->638 657->656 663 5f5583-5f5586 659->663 660->663 664 5f55a9-5f55ae 661->664 665 5f55b3 661->665 663->656 666 5f55b8 664->666 665->666 666->656 670 5f5625-5f562c 667->670 671 5f5631-5f5635 667->671 668->667 670->652 673 5f563b-5f564a 671->673 674 5f5657 671->674 673->674 675 5f5650-5f5655 673->675 676 5f565c-5f565e 674->676 675->676 677 5f5664-5f566b 676->677 678 5f5670-5f56ad call 670da2 676->678 677->652 681 5f56bf-5f56fc call 670da2 678->681 682 5f56b3-5f56ba 678->682 685 5f570e 681->685 686 5f5702-5f5709 681->686 682->652 685->652 686->652
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: vC_
                                            • API String ID: 0-2411568467
                                            • Opcode ID: 1c4dda3368cdca0c89a98bb64a06a57f86725e935613fc8f95a55cf08c70be4c
                                            • Instruction ID: 8681a458051ee2a07c642eea8abbf43eb4025d26925c681c52277016a0bc552d
                                            • Opcode Fuzzy Hash: 1c4dda3368cdca0c89a98bb64a06a57f86725e935613fc8f95a55cf08c70be4c
                                            • Instruction Fuzzy Hash: 2D1241B1A4134ADBEF10CF98DCC17A9BBB1FF19324F280465D615AB341E378A951CB62
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c673c911b44b72776cfcf8a89ebfcd91a3f6c350f2bbc2778d8ce28c94b059d5
                                            • Instruction ID: 6afd92ac2057d4cb10981bfa3c39769624b99d9aab4f6c66045804a2187ca17d
                                            • Opcode Fuzzy Hash: c673c911b44b72776cfcf8a89ebfcd91a3f6c350f2bbc2778d8ce28c94b059d5
                                            • Instruction Fuzzy Hash: 90510F74E40309EBEF51AFD0D847BAEBB71EF04701F10406AF6047A2E1D6B91A54DB9A

                                            Control-flow Graph

                                            APIs
                                            • EnterCriticalSection.KERNEL32(009BED40,009BED14,00000000,?,009BED24,009BED24,00771B57,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516,?,00000000), ref: 007717CB
                                            • GlobalAlloc.KERNELBASE(00002002,00000000,?,?,009BED24,009BED24,00771B57,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516,?,00000000), ref: 00771820
                                            • GlobalHandle.KERNEL32(00AE2DB8), ref: 00771829
                                            • GlobalUnlock.KERNEL32(00000000), ref: 00771832
                                            • GlobalReAlloc.KERNEL32(00000000,00000000,00002002), ref: 00771844
                                            • GlobalHandle.KERNEL32(00AE2DB8), ref: 0077185B
                                            • GlobalLock.KERNEL32(00000000), ref: 00771862
                                            • LeaveCriticalSection.KERNEL32(00750620,?,?,009BED24,009BED24,00771B57,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516,?,00000000), ref: 00771868
                                            • GlobalLock.KERNEL32(00000000), ref: 00771877
                                            • LeaveCriticalSection.KERNEL32(?), ref: 007718C0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: Global$CriticalSection$AllocHandleLeaveLock$EnterUnlock
                                            • String ID:
                                            • API String ID: 2667261700-0
                                            • Opcode ID: b9aa6e98fee352e717c27d858536b08f66c8ace75c97368fedfd459b2cb24533
                                            • Instruction ID: c49e031babc9136f64bd2345eebc661b91d504934a9c67b0278a701aa60983c2
                                            • Opcode Fuzzy Hash: b9aa6e98fee352e717c27d858536b08f66c8ace75c97368fedfd459b2cb24533
                                            • Instruction Fuzzy Hash: 9831D5716003099FDB248F28DC89A2AB7E9FF44355F40892DF85AC7661E779E884CB21

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 19 5f316c-5f3180 call 5f2e6c 22 5f318a-5f31b8 call 5f2f2c 19->22 23 5f3182-5f3189 19->23 22->23 26 5f31ba-5f31e3 call 5f2f2c 22->26 26->23 29 5f31e5-5f321a call 5f2f2c 26->29 29->23 32 5f3220-5f3256 call 5f2f2c 29->32 32->23 35 5f325c-5f3269 32->35 36 5f326f-5f3287 35->36 37 5f3351-5f335d 35->37 36->37 38 5f328d-5f328f 36->38 39 5f3291-5f32ab LoadLibraryA 38->39 40 5f32ad-5f32b0 39->40 41 5f32b4-5f32c1 39->41 40->41 42 5f3335-5f334b 41->42 43 5f32c3-5f32cb 41->43 42->37 42->39 44 5f32cc-5f32d0 43->44 45 5f32d7-5f32da 44->45 46 5f32d2-5f32d5 44->46 47 5f32dc-5f32e2 45->47 46->47 48 5f32fb-5f3308 47->48 49 5f32e4-5f32f9 47->49 52 5f330a-5f332f 48->52 53 5f335e-5f3361 48->53 49->48 49->52 52->44 54 5f3331 52->54 55 5f3387-5f3390 53->55 56 5f3363-5f3369 53->56 54->42 57 5f336c-5f336e 56->57 57->55 58 5f3370-5f3385 57->58 58->55 58->57
                                            APIs
                                            • LoadLibraryA.KERNELBASE(?,?,?), ref: 005F329A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: LibraryLoad
                                            • String ID: Load$dleA$eHan$odul
                                            • API String ID: 1029625771-1617681351
                                            • Opcode ID: cbb446ad3e450375899919343118c7f7fd091695d447855841496772320d1268
                                            • Instruction ID: 5ce97deee42d2b7698d2c173231c33487013e37c7e503550defc180d348c21e5
                                            • Opcode Fuzzy Hash: cbb446ad3e450375899919343118c7f7fd091695d447855841496772320d1268
                                            • Instruction Fuzzy Hash: 6D5184B06093469FDB25CF19C880B2FBBE0BF80354F44582DF9868B250DB74DA04CB96

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 153 5f300c-5f301c call 5f2e6c 156 5f301e-5f3023 153->156 157 5f3024-5f3051 call 5f2f2c 153->157 160 5f305a-5f3067 VirtualAlloc 157->160 161 5f3053-5f3059 157->161 162 5f3069-5f3071 160->162 163 5f3074-5f307a 160->163 162->163
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: Virt$lloc$ualA
                                            • API String ID: 0-1619206022
                                            • Opcode ID: fc702225be9061ec86dcb6acbd893243b6e9044b5065bc4ab79030e5725022ff
                                            • Instruction ID: 9a99a7794db38981c7177ba74c7b69accb4b8c7669952ec6ce5fd681933fef81
                                            • Opcode Fuzzy Hash: fc702225be9061ec86dcb6acbd893243b6e9044b5065bc4ab79030e5725022ff
                                            • Instruction Fuzzy Hash: 49F0817170031123E3306A2D5C05B6BBE9CEBC0761F50482AFF48D6281E63DD60846F5

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 164 5c9db4-5c9dce call 5ca314 167 5c9ddc-5c9deb 164->167 168 5c9dd0-5c9dd9 164->168 169 5c9ded-5c9df6 167->169 170 5c9df9-5c9e14 VirtualAlloc 167->170 171 5c9e3c-5c9ee2 VirtualAlloc call 5ca314 170->171 172 5c9e16-5c9e2c VirtualAlloc 170->172 182 5c9f7f-5c9f8c 171->182 183 5c9ee8-5c9eeb 171->183 173 5c9e2e-5c9e35 172->173 174 5c9e38 172->174 174->171 185 5ca00d-5ca02b call 5ca314 182->185 186 5c9f8e-5c9fac call 5ca314 182->186 184 5c9ef1-5c9ef4 183->184 187 5c9f2c-5c9f5b VirtualAlloc 184->187 188 5c9ef6-5c9eff 184->188 195 5ca10c-5ca11d call 5ca164 185->195 196 5ca031-5ca042 185->196 186->185 199 5c9fae-5c9fb7 186->199 191 5c9f5e-5c9f75 187->191 188->191 192 5c9f01-5c9f2a 188->192 197 5c9eed 191->197 198 5c9f7b 191->198 192->191 209 5ca14d-5ca156 195->209 210 5ca11f-5ca127 195->210 196->195 211 5ca048 196->211 197->184 198->182 199->185 202 5c9fb9-5c9fcc 199->202 203 5c9fce-5c9fe1 202->203 204 5ca004-5ca00b 202->204 207 5c9ff0-5c9ffe 203->207 208 5c9fe3-5c9fee 203->208 204->185 204->202 207->203 212 5ca000 207->212 208->207 213 5ca129-5ca12d 210->213 214 5ca134-5ca143 call 5ca274 210->214 215 5ca052-5ca057 211->215 212->204 218 5ca130-5ca132 213->218 215->195 217 5ca05d-5ca069 215->217 217->214 222 5ca06f-5ca091 217->222 218->214 221 5ca146 218->221 221->209 222->214 225 5ca097-5ca0a8 222->225 226 5ca0aa-5ca0b3 225->226 227 5ca0b5-5ca0ba 225->227 228 5ca0bc-5ca0c0 226->228 227->228 229 5ca0f2-5ca106 228->229 230 5ca0c2-5ca0c7 228->230 229->195 235 5ca04a-5ca04e 229->235 231 5ca0c9-5ca0cf 230->231 232 5ca0d1-5ca0d9 230->232 234 5ca0da-5ca0e3 231->234 232->234 234->214 237 5ca0e5-5ca0f0 234->237 235->215 237->229 237->230
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5bb8a685bf1bd5e33466207a3a456ce10b593972edef8410563dcc0edac835a5
                                            • Instruction ID: e14131765db79b148059ffd3850410ea0d40e9c0d83a74ed04f621a44fd0b8c5
                                            • Opcode Fuzzy Hash: 5bb8a685bf1bd5e33466207a3a456ce10b593972edef8410563dcc0edac835a5
                                            • Instruction Fuzzy Hash: 7DC166716043059FDB24CF68C888B6ABBE5FF88754F18882DFA55CB290D775E805CB62

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 238 5ca164-5ca1c9 call 5ca314 241 5ca1cf-5ca1d1 238->241 242 5ca262-5ca267 238->242 243 5ca1d4-5ca1f0 241->243 244 5ca205-5ca214 243->244 245 5ca1f2-5ca203 243->245 246 5ca21c-5ca223 244->246 247 5ca216 244->247 251 5ca248-5ca25a 245->251 249 5ca225-5ca227 246->249 250 5ca237 246->250 247->246 252 5ca22e-5ca230 249->252 253 5ca229-5ca22c 249->253 250->251 254 5ca239-5ca244 VirtualProtect 250->254 251->243 257 5ca260-5ca261 251->257 252->251 256 5ca232 252->256 255 5ca235 253->255 254->251 255->250 256->255 257->242
                                            APIs
                                            • VirtualProtect.KERNELBASE(?,?,?,00000008,?,00000000), ref: 005CA244
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID: $@
                                            • API String ID: 544645111-1077428164
                                            • Opcode ID: 915545cbe567c01626b14eff9675be2d98f27318c9a73fb88666fa9e01ed22a5
                                            • Instruction ID: eae3bf03d236b7073bb0c84048a6b110391ce6ca5129a973bfe9d2f8d8d40abd
                                            • Opcode Fuzzy Hash: 915545cbe567c01626b14eff9675be2d98f27318c9a73fb88666fa9e01ed22a5
                                            • Instruction Fuzzy Hash: 1131C0755043058FE704CF94C498B6BBFE9FBC4308F448A0CE9455B284D776E944CB92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 258 76c251-76c25a call 77159b 261 76c2af 258->261 262 76c25c-76c287 call 771369 GetCurrentThreadId SetWindowsHookExA call 771bb8 258->262 266 76c28c-76c292 262->266 267 76c294-76c299 call 77159b 266->267 268 76c29f-76c2ae call 771b23 266->268 267->268 268->261
                                            APIs
                                            • GetCurrentThreadId.KERNEL32 ref: 0076C264
                                            • SetWindowsHookExA.USER32(000000FF,VO,00000000,00000000), ref: 0076C274
                                              • Part of subcall function 00771BB8: __EH_prolog.LIBCMT ref: 00771BBD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: CurrentH_prologHookThreadWindows
                                            • String ID: VO
                                            • API String ID: 2183259885-4150196836
                                            • Opcode ID: 57f650f7e585001c336e4a294202df92b676dca91492bffa1b1dc83e2423ee58
                                            • Instruction ID: e9172fc2dc0ac7580df4be5c050946394d0610003ebc2f5463f2bc425aa47a79
                                            • Opcode Fuzzy Hash: 57f650f7e585001c336e4a294202df92b676dca91492bffa1b1dc83e2423ee58
                                            • Instruction Fuzzy Hash: AEF0A7715003109FDF352BF4AC0EB793690BB057A0F898658B55B964E2C72C9D808752

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 520 772447-772472 SetErrorMode * 2 call 77159b * 2 525 772474-77248e call 7724aa 520->525 526 772493-77249d call 77159b 520->526 525->526 530 7724a4-7724a7 526->530 531 77249f call 76c251 526->531 531->530
                                            APIs
                                            • SetErrorMode.KERNELBASE(00000000,00000000,0076D535,00000000,00000000,00000000,00000000,?,00000000,?,00763A96,00000000,00000000,00000000,00000000,00750620), ref: 00772450
                                            • SetErrorMode.KERNELBASE(00000000,?,00000000,?,00763A96,00000000,00000000,00000000,00000000,00750620,00000000), ref: 00772457
                                              • Part of subcall function 007724AA: GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,?), ref: 007724DB
                                              • Part of subcall function 007724AA: lstrcpyA.KERNEL32(?,.HLP,?,?,00000104), ref: 0077257C
                                              • Part of subcall function 007724AA: lstrcatA.KERNEL32(?,.INI,?,?,00000104), ref: 007725A9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: ErrorMode$FileModuleNamelstrcatlstrcpy
                                            • String ID:
                                            • API String ID: 3389432936-0
                                            • Opcode ID: 3623cad081243b3c66c58aad6fbad77096c9c33826dff9fcaf6ead10b2707044
                                            • Instruction ID: 82a7f5d04bc0a90b124bc3b0cec6b3a9fd30204bea6f9e39a50b38b030625f2d
                                            • Opcode Fuzzy Hash: 3623cad081243b3c66c58aad6fbad77096c9c33826dff9fcaf6ead10b2707044
                                            • Instruction Fuzzy Hash: 89F037759142108FDB18AF24D448F297BA4AF88760F05C88AF4499B2A3CB78D841CB96

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 533 757f7d-757f9b HeapCreate 534 757fd3-757fd5 533->534 535 757f9d-757faa call 757e35 533->535 538 757fac-757fb7 call 75b983 535->538 539 757fb9-757fbc 535->539 545 757fc3-757fc5 538->545 541 757fd6-757fd9 539->541 542 757fbe call 75c4ca 539->542 542->545 545->541 546 757fc7-757fcd HeapDestroy 545->546 546->534
                                            APIs
                                            • HeapCreate.KERNELBASE(00000000,00001000,00000000,0075059E,00000001), ref: 00757F8E
                                              • Part of subcall function 00757E35: GetVersionExA.KERNEL32 ref: 00757E54
                                            • HeapDestroy.KERNEL32 ref: 00757FCD
                                              • Part of subcall function 0075B983: HeapAlloc.KERNEL32(00000000,00000140,00757FB6,000003F8), ref: 0075B990
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: Heap$AllocCreateDestroyVersion
                                            • String ID:
                                            • API String ID: 2507506473-0
                                            • Opcode ID: a6d687685ebefb8dcf4b78ddbdf39f882f6894ead71bba44944e11cb29aff8d0
                                            • Instruction ID: 3a961f8ca6454bb1ee31ed2a7149d5caec7bed5471ce4434a50b784157c728eb
                                            • Opcode Fuzzy Hash: a6d687685ebefb8dcf4b78ddbdf39f882f6894ead71bba44944e11cb29aff8d0
                                            • Instruction Fuzzy Hash: 51F06570A2D302DEEB68AB317C49FA92699AB447D7F10C425FD08C40E0EBE8C58AD951

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 687 7521b5-7521e0 688 752225-752228 687->688 689 7521e2-7521eb 687->689 690 752284-752289 688->690 692 75222a-75222f 688->692 689->690 691 7521f1-752215 call 75a644 call 75bd1f call 75221c 689->691 694 75228e-752293 690->694 695 75228b-75228d 690->695 691->690 712 752217 691->712 696 752231-752237 692->696 697 752239-75223b 692->697 700 752294-75229c RtlAllocateHeap 694->700 695->694 698 75223c-752245 696->698 697->698 701 752275-752276 698->701 702 752247-752273 call 75a644 call 75c7c2 call 75227b 698->702 704 7522a2-7522b0 700->704 701->700 702->701 702->704 712->704
                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000000,-0000000F,00000000,?,00000000,00000000,00000000), ref: 0075229C
                                              • Part of subcall function 0075A644: InitializeCriticalSection.KERNEL32(00000000,00000000,?,?,0075317B,00000009,00000000,00000000,00000001,00757DC6,00000001,00000074,?,?,00000000,00000001), ref: 0075A681
                                              • Part of subcall function 0075A644: EnterCriticalSection.KERNEL32(?,?,?,0075317B,00000009,00000000,00000000,00000001,00757DC6,00000001,00000074,?,?,00000000,00000001), ref: 0075A69C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: CriticalSection$AllocateEnterHeapInitialize
                                            • String ID:
                                            • API String ID: 1616793339-0
                                            • Opcode ID: 8b1a38f6247eb6d989a324e387eef41563d8299022cbc165e05318b10eb6c76b
                                            • Instruction ID: 89836a18855e309195d420436ac383a4585d67152af6e16aa7399bed35332ad2
                                            • Opcode Fuzzy Hash: 8b1a38f6247eb6d989a324e387eef41563d8299022cbc165e05318b10eb6c76b
                                            • Instruction Fuzzy Hash: 3121F736A04245EBDB10EFA4DC46BD9B764FB02725F258215FC10EB1C2D7FC99468A94
                                            APIs
                                            • LoadStringA.USER32(?,?,?,?), ref: 0076D094
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: LoadString
                                            • String ID:
                                            • API String ID: 2948472770-0
                                            • Opcode ID: 8d2714907eb33461673dc6a833bbdf2c3baf700afe89b1b8dd87067bb9e2281a
                                            • Instruction ID: 38b32b7efd3a52654790100cb9fd2c265daa55d0349f89a5c7c26ac8ad6f4fb2
                                            • Opcode Fuzzy Hash: 8d2714907eb33461673dc6a833bbdf2c3baf700afe89b1b8dd87067bb9e2281a
                                            • Instruction Fuzzy Hash: 20D0A7725093A19BCB11DF609C08D5FBBA8BF94360B044C0DF48843112C324C854C762
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 1&x$1&x$1&x$1&x$101010$30759d-020202$4a811e-020202$8214ad-010101$9Fx$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$C&x$DEx$b7a996-020202$}Ex
                                            • API String ID: 0-2393341226
                                            • Opcode ID: ad6643a92dd7ab9e5f532b8deace2c4f4f5d114a2288e7b82bcb649b99a2e952
                                            • Instruction ID: 7f412e534860c4cfb1579fee09ee139da1bd90e6beae0eff424f6b640fc5987f
                                            • Opcode Fuzzy Hash: ad6643a92dd7ab9e5f532b8deace2c4f4f5d114a2288e7b82bcb649b99a2e952
                                            • Instruction Fuzzy Hash: 7BD36CB1A44309AFEB10DF94ECC2F9D7BB1FF59700F104069F609BA2D1E6B56A508B25
                                            APIs
                                            • LoadLibraryA.KERNEL32(user32.dll,?,00000000,00000000,00758137,?,Microsoft Visual C++ Runtime Library,00012010,?,008679A4,?,008679F4,?,?,?,Runtime Error!Program: ), ref: 007609E5
                                            • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 007609FD
                                            • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 00760A0E
                                            • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 00760A1B
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: AddressProc$LibraryLoad
                                            • String ID: GetActiveWindow$GetLastActivePopup$MessageBoxA$user32.dll
                                            • API String ID: 2238633743-4044615076
                                            • Opcode ID: 0691b7163e2130e390614f77b0be366d4e9388bff6f859a782786667624bcb9e
                                            • Instruction ID: e774663a543914b91d96a7b80568993c9c23a57e803acd931409df54f469abde
                                            • Opcode Fuzzy Hash: 0691b7163e2130e390614f77b0be366d4e9388bff6f859a782786667624bcb9e
                                            • Instruction Fuzzy Hash: F401A731754302AF87118FF59D88A2B3AE9FB587D1304553AF90ED2271DBB8C854ABA0
                                            APIs
                                            • GetVersion.KERNEL32(?,007728D3,?,00771BD9,00000010,?,00000000,?,?,?,007715C0,00771623,00770EA4,007715C6,0076C241,0076D516), ref: 00772843
                                            • InitializeCriticalSection.KERNEL32(009BEEE8,?,007728D3,?,00771BD9,00000010,?,00000000,?,?,?,007715C0,00771623,00770EA4,007715C6,0076C241), ref: 00772868
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: CriticalInitializeSectionVersion
                                            • String ID:
                                            • API String ID: 385228656-0
                                            • Opcode ID: ca1ae8a4aeae3f3236a4157168da6fdaff7decafc00250da78d3a70d97a49c82
                                            • Instruction ID: 047a495eea8cd375023acff7cae086e4089853058f3c4ae16423a51d4e71c4bd
                                            • Opcode Fuzzy Hash: ca1ae8a4aeae3f3236a4157168da6fdaff7decafc00250da78d3a70d97a49c82
                                            • Instruction Fuzzy Hash: F8E04F30568110CBE7116B1EBE1D7983290A300375F10C129F01D90177D37A54839F5D
                                            APIs
                                            • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?), ref: 00758080
                                            • GetStdHandle.KERNEL32(000000F4,008679A4,00000000,00000000,00000000,?), ref: 00758156
                                            • WriteFile.KERNEL32(00000000), ref: 0075815D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: File$HandleModuleNameWrite
                                            • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                            • API String ID: 3784150691-4022980321
                                            • Opcode ID: 4a418568294aae3835e0f729fc5ce3856f14a7e7ebc9592928e03922f9cb69fd
                                            • Instruction ID: 44f622d4468b80d98e23e9a24e75c0deb8205fa352d95fb89a8a0289b911ba55
                                            • Opcode Fuzzy Hash: 4a418568294aae3835e0f729fc5ce3856f14a7e7ebc9592928e03922f9cb69fd
                                            • Instruction Fuzzy Hash: 2731FC72A00208AFDF20D660CD49FEE73ACEF45345F500556F955E6091EBBCEA898B52
                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,007505D6), ref: 00757A67
                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,007505D6), ref: 00757A7B
                                            • GetEnvironmentStringsW.KERNEL32(?,00000000,?,?,?,?,007505D6), ref: 00757AA7
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,007505D6), ref: 00757ADF
                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,00000000,?,?,?,?,007505D6), ref: 00757B01
                                            • FreeEnvironmentStringsW.KERNEL32(00000000,?,00000000,?,?,?,?,007505D6), ref: 00757B1A
                                            • GetEnvironmentStrings.KERNEL32(?,00000000,?,?,?,?,007505D6), ref: 00757B2D
                                            • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 00757B6B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: EnvironmentStrings$ByteCharFreeMultiWide
                                            • String ID:
                                            • API String ID: 1823725401-0
                                            • Opcode ID: 6250da8d714141b913b6368297f7e7e76414937a03895072b1486378cc25c962
                                            • Instruction ID: 3d309e1480c501acbe32c8ede31e6c109b649d0e977c391e5435de9cc83bc79b
                                            • Opcode Fuzzy Hash: 6250da8d714141b913b6368297f7e7e76414937a03895072b1486378cc25c962
                                            • Instruction Fuzzy Hash: D33153F250C2556FD7243B7C7C888BFB69CEB45396B140629FD45C3102EBA88C89C2A0
                                            APIs
                                            • TlsGetValue.KERNEL32(009BED24,009BED14,00000000,?,009BED24,?,00771B93,009BED14,00000000,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516), ref: 00771936
                                            • EnterCriticalSection.KERNEL32(009BED40,00000010,?,009BED24,?,00771B93,009BED14,00000000,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516), ref: 00771985
                                            • LeaveCriticalSection.KERNEL32(009BED40,00000000,?,009BED24,?,00771B93,009BED14,00000000,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516), ref: 00771998
                                            • LocalAlloc.KERNEL32(00000000,00000004,?,009BED24,?,00771B93,009BED14,00000000,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516), ref: 007719AE
                                            • LocalReAlloc.KERNEL32(?,00000004,00000002,?,009BED24,?,00771B93,009BED14,00000000,?,00000000,007715AA,00770EA4,007715C6,0076C241,0076D516), ref: 007719C0
                                            • TlsSetValue.KERNEL32(009BED24,00000000), ref: 007719FC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: AllocCriticalLocalSectionValue$EnterLeave
                                            • String ID:
                                            • API String ID: 4117633390-0
                                            • Opcode ID: 88b5661ead41c3b53950aad7ac59e45f8e1eb19f8f27409ae64a6f1363f8cc08
                                            • Instruction ID: f4dbfdad62db97a9eea36dcefb3f67ecff522756c77eb6db9f164fe90a6befbd
                                            • Opcode Fuzzy Hash: 88b5661ead41c3b53950aad7ac59e45f8e1eb19f8f27409ae64a6f1363f8cc08
                                            • Instruction Fuzzy Hash: BC316971200609EFDB24CF28C899F6AB7A8FB44394F40C529E56AC7650EB78F855CF60
                                            APIs
                                            • GetStartupInfoA.KERNEL32(?), ref: 00757BDC
                                            • GetFileType.KERNEL32(?,?,00000000), ref: 00757C87
                                            • GetStdHandle.KERNEL32(-000000F6,?,00000000), ref: 00757CEA
                                            • GetFileType.KERNEL32(00000000,?,00000000), ref: 00757CF8
                                            • SetHandleCount.KERNEL32 ref: 00757D2F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: FileHandleType$CountInfoStartup
                                            • String ID:
                                            • API String ID: 1710529072-0
                                            • Opcode ID: 04bf7840eb71f9048b8ec920288f57f076af60804794a682183ffdd5f0e1fcac
                                            • Instruction ID: 88d7edcaa56588c8c0153b8ea9d41963432afe48834d10ab0d0b2de8e0a3ed19
                                            • Opcode Fuzzy Hash: 04bf7840eb71f9048b8ec920288f57f076af60804794a682183ffdd5f0e1fcac
                                            • Instruction Fuzzy Hash: A85109719082458BC724CF28D888BE977E4BB01366F248658D896CB2E1D7B9D94DD760
                                            APIs
                                            • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00000000,0075BDF0,00000000,00000000,00000000,00752203,00000000,00000000,?,00000000,00000000,00000000), ref: 0075C050
                                            • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,0075BDF0,00000000,00000000,00000000,00752203,00000000,00000000,?,00000000,00000000,00000000), ref: 0075C084
                                            • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0075C09E
                                            • HeapFree.KERNEL32(00000000,?), ref: 0075C0B5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: AllocHeap$FreeVirtual
                                            • String ID:
                                            • API String ID: 3499195154-0
                                            • Opcode ID: 5ff03c8a3faaf99d86643a8f910b2e9522047135eba8673f797fc390b6a2a287
                                            • Instruction ID: 12af076eed6dd39cd68cb1aa337f9dab9af9530b0ef86a9563476cce8591e152
                                            • Opcode Fuzzy Hash: 5ff03c8a3faaf99d86643a8f910b2e9522047135eba8673f797fc390b6a2a287
                                            • Instruction Fuzzy Hash: 061116706143809FC7219F18EC45EA67BB6FB84759750CA1EF55AC71F0D3B09A49EB04
                                            APIs
                                            • EnterCriticalSection.KERNEL32(009BEEE8,?,00000000,?,?,00771BD9,00000010,?,00000000,?,?,?,007715C0,00771623,00770EA4,007715C6), ref: 007728FE
                                            • InitializeCriticalSection.KERNEL32(00000000,?,00000000,?,?,00771BD9,00000010,?,00000000,?,?,?,007715C0,00771623,00770EA4,007715C6), ref: 00772910
                                            • LeaveCriticalSection.KERNEL32(009BEEE8,?,00000000,?,?,00771BD9,00000010,?,00000000,?,?,?,007715C0,00771623,00770EA4,007715C6), ref: 00772919
                                            • EnterCriticalSection.KERNEL32(00000000,00000000,?,?,00771BD9,00000010,?,00000000,?,?,?,007715C0,00771623,00770EA4,007715C6,0076C241), ref: 0077292B
                                              • Part of subcall function 00772830: GetVersion.KERNEL32(?,007728D3,?,00771BD9,00000010,?,00000000,?,?,?,007715C0,00771623,00770EA4,007715C6,0076C241,0076D516), ref: 00772843
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.3370582862.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.3370559684.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.000000000077B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370826186.0000000000780000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370907049.0000000000877000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370918975.0000000000879000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370930490.000000000087B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370943729.0000000000885000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370955000.0000000000886000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370967594.000000000088B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3370978602.000000000088C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371033228.000000000094A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371046114.000000000094D000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000094E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.000000000095B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009BD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371058161.00000000009C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.3371114594.00000000009C5000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Similarity
                                            • API ID: CriticalSection$Enter$InitializeLeaveVersion
                                            • String ID:
                                            • API String ID: 1193629340-0
                                            • Opcode ID: aed0af17f987a8a4052743a95b299a315400a4defa484e051895384984c7b515
                                            • Instruction ID: 6415215e0ed5e9aed6d9ebee17b600aae9e4ec7ce97b3f281d611122eaf5a4a6
                                            • Opcode Fuzzy Hash: aed0af17f987a8a4052743a95b299a315400a4defa484e051895384984c7b515
                                            • Instruction Fuzzy Hash: 28F0623101420ADFCB10DF64ED88996B3ADFB14366F40893AE21E92027D738B496DFA5