Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Loader.exe

Overview

General Information

Sample name:Loader.exe
Analysis ID:1561197
MD5:a19206ac176dd5a0a3a02ff70348c1ab
SHA1:7c9d46c18de701162bdb962618788a0da0872779
SHA256:3eafeb6f88583eaff49c7bc7e91ddc1a6b0792451465403b07b67e98b447c242
Tags:exeuser-aachum
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Abnormal high CPU Usage
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
PE file contains sections with non-standard names
Program does not show much activity (idle)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Loader.exe (PID: 7112 cmdline: "C:\Users\user\Desktop\Loader.exe" MD5: A19206AC176DD5A0A3A02FF70348C1AB)
    • conhost.exe (PID: 7092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Loader.exeReversingLabs: Detection: 15%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: JeXhPKdKIKb D7rgFPlKCo34I.PDBr source: Loader.exe
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113E898 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0113E898
Source: C:\Users\user\Desktop\Loader.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036EFE30 NtAllocateVirtualMemory,0_2_036EFE30
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036F12B0 NtProtectVirtualMemory,0_2_036F12B0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036D85F0 NtContinue,0_2_036D85F0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036E9C30 NtContinue,RtlAddVectoredExceptionHandler,0_2_036E9C30
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113100E0_2_0113100E
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011320B00_2_011320B0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011313500_2_01131350
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0114C3C00_2_0114C3C0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113322C0_2_0113322C
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113240F0_2_0113240F
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113276D0_2_0113276D
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113362F0_2_0113362F
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113B69E0_2_0113B69E
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011316A10_2_011316A1
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011319E30_2_011319E3
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0114C8100_2_0114C810
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01112B760_2_01112B76
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01132ADA0_2_01132ADA
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01131D420_2_01131D42
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01132E380_2_01132E38
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0114BE900_2_0114BE90
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01155EF70_2_01155EF7
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_030BD2AB0_2_030BD2AB
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_030D183B0_2_030D183B
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_030BF8BB0_2_030BF8BB
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_030CE67B0_2_030CE67B
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_030D2CBB0_2_030D2CBB
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036EFE300_2_036EFE30
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036F12B00_2_036F12B0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036D27400_2_036D2740
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036DC3200_2_036DC320
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036DDEB00_2_036DDEB0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036ECC700_2_036ECC70
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036D88E00_2_036D88E0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036DB8A00_2_036DB8A0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036D6CA00_2_036D6CA0
Source: C:\Users\user\Desktop\Loader.exeCode function: String function: 01112720 appears 51 times
Source: Loader.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: Loader.exeBinary or memory string: Q.slnaqb7Mm09E5x1HrOE
Source: classification engineClassification label: mal56.evad.winEXE@2/0@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7092:120:WilError_03
Source: Loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Loader.exeReversingLabs: Detection: 15%
Source: unknownProcess created: C:\Users\user\Desktop\Loader.exe "C:\Users\user\Desktop\Loader.exe"
Source: C:\Users\user\Desktop\Loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Loader.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\Loader.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\Loader.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Loader.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\Loader.exeSection loaded: wtsapi32.dllJump to behavior
Source: Loader.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: Loader.exeStatic file information: File size 6990848 > 1048576
Source: Loader.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x39fe00
Source: Loader.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x19b600
Source: Loader.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: Binary string: JeXhPKdKIKb D7rgFPlKCo34I.PDBr source: Loader.exe
Source: Loader.exeStatic PE information: section name: .eh_fram
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011184B7 push edi; ret 0_2_011184C0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01112770 push ecx; ret 0_2_01112783
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01158FB1 push ecx; ret 0_2_01158FC4
Source: C:\Users\user\Desktop\Loader.exeAPI coverage: 5.3 %
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113E898 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_0113E898
Source: Loader.exeBinary or memory string: HEfOycLtTmHjqEmUcfzh6M
Source: Loader.exeBinary or memory string: rxRGjC4C5U2tncdvNASs8tqeMu3

Anti Debugging

barindex
Source: C:\Users\user\Desktop\Loader.exeProcess Stats: CPU usage > 42% for more than 60s
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036DF790 LdrLoadDll,RtlCreateUserThread,0_2_036DF790
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011124C9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_011124C9
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_02F60470 mov eax, dword ptr fs:[00000030h]0_2_02F60470
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036D88E0 mov eax, dword ptr fs:[00000030h]0_2_036D88E0
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011110A0 GetProcessHeap,RtlAllocateHeap,0_2_011110A0
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_011124C9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_011124C9
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01112659 SetUnhandledExceptionFilter,0_2_01112659
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_0113DAD6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0113DAD6
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01112EF9 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_01112EF9
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_036E9C30 NtContinue,RtlAddVectoredExceptionHandler,0_2_036E9C30
Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_0115111E
Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_011511B9
Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_01141049
Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_011510B5
Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_01151244
Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_011515C0
Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_01151497
Source: C:\Users\user\Desktop\Loader.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_0115179C
Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_011516C6
Source: C:\Users\user\Desktop\Loader.exeCode function: GetLocaleInfoW,0_2_01141990
Source: C:\Users\user\Desktop\Loader.exeCode function: EnumSystemLocalesW,0_2_01140EAA
Source: C:\Users\user\Desktop\Loader.exeCode function: 0_2_01112061 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_01112061
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory121
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager11
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS1
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
Obfuscated Files or Information
LSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Loader.exe16%ReversingLabsWin32.Malware.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1561197
Start date and time:2024-11-22 22:05:14 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 8m 9s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:Loader.exe
Detection:MAL
Classification:mal56.evad.winEXE@2/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 67%
  • Number of executed functions: 12
  • Number of non-executed functions: 75
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: Loader.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
Entropy (8bit):6.4454862218308975
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.24%
  • Win32 EXE PECompact compressed (generic) (41571/9) 0.41%
  • UPX compressed Win32 Executable (30571/9) 0.30%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
File name:Loader.exe
File size:6'990'848 bytes
MD5:a19206ac176dd5a0a3a02ff70348c1ab
SHA1:7c9d46c18de701162bdb962618788a0da0872779
SHA256:3eafeb6f88583eaff49c7bc7e91ddc1a6b0792451465403b07b67e98b447c242
SHA512:9a6b3290dd419bfbd98adc80a98b8390330fc7f7d9f23ce791d1669d59a8d2b664472a06981d0f75f6b39d7b9d8ca3343fc975dd2231f8b7dfe9a04a9eb5f4ce
SSDEEP:49152:hAYPitlDx9EF21D+q5iLYzQFO/qgB5ErS4D7gKORCpdb0OF8rDuuBqbUXwW2WQCu:hAYPitllE+F55EG4D7g
TLSH:9C66A1891808C4F9DFB6C96502BBBFBF970B4718D8429C89D5F60C8D276721D649F23A
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."i?g...............+..9...j...............:...@...........................k.....b.j...@... ............................
Icon Hash:90cececece8e8eb0
Entrypoint:0x4013f0
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows cui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x673F6922 [Thu Nov 21 17:08:50 2024 UTC]
TLS Callbacks:0x401640, 0x401600
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:1a54da199406fe111fc3b5a592f08d87
Instruction
mov dword ptr [00A080A4h], 00000000h
jmp 00007F5C493DC2C6h
nop
jmp 00007F5C493DD728h
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
nop
push ebp
mov ebp, esp
push edi
push esi
push ebx
sub esp, 1Ch
mov dword ptr [esp], 0082A000h
call dword ptr [00A09894h]
sub esp, 04h
test eax, eax
je 00007F5C493DC5D5h
mov ebx, eax
mov dword ptr [esp], 0082A000h
call dword ptr [00A09924h]
mov edi, dword ptr [00A0989Ch]
sub esp, 04h
mov dword ptr [00A08020h], eax
mov dword ptr [esp+04h], 0082A013h
mov dword ptr [esp], ebx
call edi
sub esp, 08h
mov esi, eax
mov dword ptr [esp+04h], 0082A029h
mov dword ptr [esp], ebx
call edi
sub esp, 08h
mov dword ptr [007A1000h], eax
test esi, esi
je 00007F5C493DC573h
mov dword ptr [esp+04h], 00A08024h
mov dword ptr [esp], 009C6100h
call esi
mov dword ptr [esp], 004014B0h
call 00007F5C493DC4D3h
lea esp, dword ptr [ebp-0Ch]
pop ebx
pop esi
pop edi
pop ebp
ret
lea esi, dword ptr [esi+00000000h]
mov eax, 00000000h
mov esi, 00000000h
jmp 00007F5C493DC522h
lea esi, dword ptr [esi+00h]
push ebp
mov ebp, esp
sub esp, 18h
mov eax, dword ptr [00000000h]
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x6090000x2a9c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60e0000x4e8.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60f0000xa0dd4.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x5c4e8c0x18.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x6097000x5c0.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x39fd980x39fe0071995eaa46a0ccf8152025a10e955bceunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x3a10000x88fc40x89000d055db72141b03a56d370c3a1e9e745dFalse0.7117233833257299data5.867159709730257IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x42a0000x19b5c80x19b6000d68079fb3cd8929e23ea74369bbee3eFalse0.7034264851109086data5.866995399894163IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.eh_fram0x5c60000x41ea00x420001fefbfa747d98b6ccb3a52a7b807da95False0.20487097537878787data5.015018994399129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.bss0x6080000xf80x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x6090000x2a9c0x2c002d57c5367a5b9dea6c418386d18c5fe4False0.36363636363636365data5.482724657748589IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT0x60c0000x300x200daeb73127b604a5ca13dabf54a40d332False0.060546875data0.19353182838821048IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.tls0x60d0000x80x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x60e0000x4e80x600ba182ec9fefdb5bc45c1fe1006dc97a5False0.3346354166666667data4.784930512373522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x60f0000xa0dd40xa0e0088be94ccaba9fa00b3d399617059ce1bFalse0.19111790986790986data6.84099732216444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0x60e0580x48fXML 1.0 document, ASCII text0.40102827763496146
DLLImport
ADVAPI32.dllAdjustTokenPrivileges, AllocateAndInitializeSid, CheckTokenMembership, CreateProcessAsUserW, EqualSid, FreeSid, GetKernelObjectSecurity, LookupAccountNameW, LookupPrivilegeValueW, OpenProcessToken, OpenThreadToken, RegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyExW, RegEnumKeyW, RegOpenKeyExW, RegOpenKeyW, RegQueryValueExW, RegQueryValueW, RegSetValueExW, SetEntriesInAclW, SetKernelObjectSecurity, SetSecurityDescriptorDacl
COMDLG32.DLLGetFileTitleW
GDI32.dllBitBlt, CreateBitmap, CreateCompatibleDC, CreateFontIndirectW, CreatePatternBrush, CreatePen, CreateRectRgnIndirect, DeleteDC, DeleteObject, Ellipse, FillRgn, GetBkColor, GetClipBox, GetDIBColorTable, GetObjectW, GetPixel, GetRgnBox, GetTextColor, GetTextExtentPoint32W, GetViewportExtEx, LPtoDP, LineTo, MoveToEx, OffsetViewportOrgEx, PtVisible, RestoreDC, SaveDC, SelectObject, SetBkColor, SetDIBColorTable, SetMapMode, SetROP2, SetViewportExtEx, SetViewportOrgEx, SetWindowExtEx, StretchBlt, TextOutW
KERNEL32.dllCloseHandle, CompareStringW, ConvertDefaultLocale, CreateDirectoryW, CreateEventW, CreateFileA, CreateFileW, CreateMutexW, CreateProcessW, DeleteCriticalSection, DuplicateHandle, EnterCriticalSection, EnumResourceLanguagesW, ExitProcess, FileTimeToSystemTime, FindClose, FormatMessageW, FreeEnvironmentStringsW, FreeLibrary, FreeResource, GetCPInfo, GetConsoleCP, GetConsoleMode, GetCurrentProcess, GetCurrentThread, GetCurrentThreadId, GetDateFormatA, GetFileAttributesW, GetFileSize, GetFileTime, GetFileType, GetFullPathNameW, GetLastError, GetLocaleInfoW, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetProcessHeap, GetStartupInfoA, GetStartupInfoW, GetStdHandle, GetStringTypeA, GetStringTypeW, GetSystemTimeAsFileTime, GetThreadLocale, GetTimeFormatA, GetTimeZoneInformation, GetVersionExW, GetVolumeInformationW, GlobalAddAtomW, GlobalAlloc, GlobalFlags, GlobalFree, GlobalGetAtomNameW, GlobalHandle, GlobalLock, GlobalUnlock, HeapAlloc, HeapCreate, HeapFree, HeapReAlloc, HeapSetInformation, HeapSize, InitializeCriticalSection, InitializeCriticalSectionAndSpinCount, IsDebuggerPresent, IsValidCodePage, K32EnumProcesses, LCMapStringA, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LoadResource, LocalAlloc, LocalReAlloc, LockFile, LockResource, MultiByteToWideChar, OpenProcess, QueryPerformanceCounter, RaiseException, ReadFile, RtlUnwind, SetEndOfFile, SetEnvironmentVariableA, SetErrorMode, SetEvent, SetFilePointer, SetLastError, SetStdHandle, SetSystemPowerState, SetUnhandledExceptionFilter, Sleep, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, UnhandledExceptionFilter, UnlockFile, VirtualAlloc, VirtualFree, VirtualProtect, VirtualQuery, WideCharToMultiByte, WriteConsoleA, WriteConsoleW, WriteFile, WritePrivateProfileStringW, lstrcmpA, lstrcmpiW, lstrlenA
MSIMG32.DLLTransparentBlt
msvcrt.dll__getmainargs, __p___initenv, __p__commode, __p__fmode, __p__iob, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _initterm, abort, atexit, calloc, exit, fprintf, free, fwrite, malloc, memcpy, signal, strlen, strncmp, vfprintf
ole32.dllCLSIDFromProgID, CLSIDFromString, CoCreateInstance, CoGetClassObject, CoGetObject, CoInitialize, CoRegisterClassObject, CoRevokeClassObject, CoSetProxyBlanket, CoTaskMemRealloc, CoUninitialize, OleFlushClipboard, OleIsCurrentClipboard, OleUninitialize, StgOpenStorageOnILockBytes, StringFromGUID2
oledlg.dllOleUIBusyW
SHELL32.dllDragFinish, DragQueryFileW, SHFileOperationW, SHGetSpecialFolderPathW, SHPathPrepareForWriteW
SHLWAPI.dllPathFindExtensionW, PathFindFileNameW, PathIsDirectoryEmptyW, PathIsUNCW
USER32.dllAdjustWindowRectEx, AnimateWindow, BeginDeferWindowPos, BringWindowToTop, BroadcastSystemMessageW, CallNextHookEx, CallWindowProcW, CharNextW, CheckMenuItem, ClientToScreen, CopyAcceleratorTableW, CopyRect, CreateDialogIndirectParamW, CreatePopupMenu, CreateWindowExW, DefWindowProcW, DeleteMenu, DestroyIcon, DestroyMenu, DestroyWindow, DispatchMessageW, DrawFocusRect, DrawIcon, DrawIconEx, DrawMenuBar, DrawTextExW, EnableMenuItem, EnableWindow, EndDeferWindowPos, ExitWindowsEx, FillRect, FindWindowW, GetCapture, GetClassInfoW, GetClassLongW, GetClassNameW, GetClientRect, GetDC, GetDlgCtrlID, GetDlgItem, GetForegroundWindow, GetKeyState, GetMenu, GetMenuCheckMarkDimensions, GetMenuItemCount, GetMenuItemInfoW, GetMessagePos, GetMessageTime, GetMessageW, GetNextDlgTabItem, GetParent, GetPropW, GetScrollPos, GetSubMenu, GetSysColor, GetSysColorBrush, GetSystemMenu, GetTopWindow, GetWindow, GetWindowLongW, GetWindowPlacement, GetWindowRect, GetWindowTextLengthW, GetWindowThreadProcessId, GrayStringW, InflateRect, IntersectRect, InvalidateRgn, IsChild, IsIconic, IsRectEmpty, IsWindow, IsWindowEnabled, IsWindowVisible, LoadBitmapW, LoadCursorW, LoadIconW, LockWindowUpdate, MapDialogRect, MapWindowPoints, MessageBeep, MessageBoxW, ModifyMenuW, OffsetRect, PeekMessageW, PtInRect, RegisterClassW, RegisterWindowMessageW, ReleaseDC, ScrollWindow, SendDlgItemMessageA, SendDlgItemMessageW, SendMessageW, SetActiveWindow, SetCapture, SetFocus, SetForegroundWindow, SetMenu, SetPropW, SetRect, SetRectEmpty, SetScrollPos, SetScrollRange, SetTimer, SetWindowContextHelpId, SetWindowLongW, SetWindowPos, SetWindowRgn, SetWindowsHookExW, ShowScrollBar, ShowWindow, SystemParametersInfoW, TabbedTextOutW, TrackPopupMenu, TranslateMessage, UnpackDDElParam, UnregisterClassW, UpdateWindow, ValidateRect, WinHelpW, wsprintfW
VERSION.dllGetFileVersionInfoSizeW, VerQueryValueW
WININET.DLLInternetAttemptConnect
WINSPOOL.DRVClosePrinter, OpenPrinterW
WTSAPI32.dllWTSEnumerateProcessesW, WTSFreeMemory
No network behavior found

Click to jump to process

Click to jump to process

Click to jump to process

Target ID:0
Start time:16:06:06
Start date:22/11/2024
Path:C:\Users\user\Desktop\Loader.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\Loader.exe"
Imagebase:0x3c0000
File size:6'990'848 bytes
MD5 hash:A19206AC176DD5A0A3A02FF70348C1AB
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Target ID:1
Start time:16:06:06
Start date:22/11/2024
Path:C:\Windows\System32\conhost.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Imagebase:0x7ff7699e0000
File size:862'208 bytes
MD5 hash:0D698AF330FD17BEE3BF90011D49251D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >

    Execution Graph

    Execution Coverage:2.2%
    Dynamic/Decrypted Code Coverage:100%
    Signature Coverage:26.8%
    Total number of Nodes:127
    Total number of Limit Nodes:14
    execution_graph 29710 2f60000 29711 2f600ae 29710->29711 29720 2f60470 29711->29720 29713 2f601d6 29714 2f601ff VirtualAlloc 29713->29714 29715 2f60289 29714->29715 29716 2f602a3 VirtualProtect 29715->29716 29717 2f602c3 VirtualProtect 29716->29717 29724 36db7b0 29717->29724 29738 2f60510 29720->29738 29722 2f6047f GetPEB 29723 2f604bb 29722->29723 29723->29713 29725 36db7bb 29724->29725 29734 2f602e9 29725->29734 29740 36d9940 29725->29740 29730 36db84f 29733 36df790 8 API calls 29730->29733 29733->29734 29735 36db7ee 29737 36db839 29735->29737 29760 36d87a0 GetPEB 29735->29760 29737->29734 29761 36dbf70 29737->29761 29739 2f60522 29738->29739 29739->29722 29765 36d87b0 29740->29765 29743 36d9958 CreateFileW 29744 36d9954 29743->29744 29744->29737 29745 36df790 29744->29745 29746 36dbf70 2 API calls 29745->29746 29747 36df946 29746->29747 29757 36db7e6 29747->29757 29770 36e9c30 29747->29770 29749 36dfa65 LdrLoadDll 29750 36dfa91 29749->29750 29749->29757 29750->29757 29774 36cede0 29750->29774 29753 36dfafe RtlCreateUserThread 29756 36dfb53 29753->29756 29755 36dfaf8 29755->29753 29756->29757 29780 36d6ca0 GetPEB 29756->29780 29759 36d8690 GetProcessHeap RtlAllocateHeap 29757->29759 29759->29735 29760->29737 29762 36dc051 29761->29762 29763 36dc197 GetProcessHeap RtlAllocateHeap 29762->29763 29764 36dc310 29763->29764 29764->29730 29766 36dbf70 2 API calls 29765->29766 29767 36d8843 29766->29767 29768 36dbf70 2 API calls 29767->29768 29769 36d886e 29768->29769 29769->29743 29769->29744 29771 36dbf70 2 API calls 29770->29771 29772 36e9c40 NtContinue RtlAddVectoredExceptionHandler 29771->29772 29772->29749 29781 36f12b0 29774->29781 29777 36f12b0 NtProtectVirtualMemory 29778 36cee81 29777->29778 29778->29753 29779 36d6ca0 GetPEB 29778->29779 29779->29755 29780->29757 29782 36f1381 29781->29782 29783 36f186a NtProtectVirtualMemory 29782->29783 29784 36cee1a 29783->29784 29784->29777 29785 36d8760 29789 111200d 29785->29789 29795 111200e 29785->29795 29786 36d877c 29790 1112010 29789->29790 29791 111201c 29790->29791 29817 11120ae GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 29790->29817 29801 1111ecf 29791->29801 29796 1112017 29795->29796 29797 111201c 29795->29797 29861 11120ae GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___get_entropy 29796->29861 29799 1111ecf 48 API calls 29797->29799 29800 111202a 29799->29800 29800->29786 29804 1111edb ___scrt_is_nonwritable_in_current_image 29801->29804 29802 1111eea 29802->29786 29803 1111f04 dllmain_raw 29803->29802 29805 1111f1e 29803->29805 29804->29802 29804->29803 29807 1111eff 29804->29807 29818 1111cc5 29805->29818 29807->29802 29828 1111c20 12 API calls 29807->29828 29809 1111f3f 29810 1111f70 29809->29810 29829 1111c20 12 API calls 29809->29829 29810->29802 29812 1111cc5 33 API calls 29810->29812 29814 1111f83 29812->29814 29813 1111f57 29816 1111f65 dllmain_raw 29813->29816 29814->29802 29815 1111f8c dllmain_raw 29814->29815 29815->29802 29816->29810 29817->29791 29819 1111cd0 29818->29819 29827 1111cdf 29818->29827 29820 1111cf5 29819->29820 29821 1111cd5 29819->29821 29830 1111d18 29820->29830 29822 1111ceb 29821->29822 29823 1111cda 29821->29823 29845 1112235 23 API calls 29822->29845 29823->29827 29844 1112254 21 API calls 29823->29844 29827->29807 29828->29809 29829->29813 29831 1111d24 ___scrt_is_nonwritable_in_current_image 29830->29831 29846 11122c5 29831->29846 29833 1111d2b 29834 1111d52 29833->29834 29835 1111e17 29833->29835 29841 1111d8e ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState 29833->29841 29854 1112227 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 29834->29854 29857 11124c9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter __FrameHandler3::FrameUnwindToState 29835->29857 29838 1111e1e 29839 1111d61 __RTC_Initialize 29839->29841 29855 11120f9 RtlInitializeSListHead 29839->29855 29841->29827 29842 1111d6f 29842->29841 29856 11121fc IsProcessorFeaturePresent ___scrt_release_startup_lock 29842->29856 29844->29827 29845->29827 29847 11122ce 29846->29847 29858 1112b76 IsProcessorFeaturePresent 29847->29858 29849 11122da 29859 1113603 10 API calls 2 library calls 29849->29859 29851 11122df 29852 11122e3 29851->29852 29860 1113635 7 API calls 2 library calls 29851->29860 29852->29833 29854->29839 29855->29842 29856->29841 29857->29838 29858->29849 29859->29851 29860->29852 29861->29797 29862 36d9650 29871 36d85f0 29862->29871 29866 36f12b0 NtProtectVirtualMemory 29869 36d985d 29866->29869 29867 36d9909 29868 36d96e8 29868->29866 29869->29867 29870 36f12b0 NtProtectVirtualMemory 29869->29870 29870->29869 29872 36dbf70 2 API calls 29871->29872 29873 36d8600 NtContinue 29872->29873 29875 36d868a 29873->29875 29876 36efe30 29875->29876 29877 36efec5 29876->29877 29878 36f0af6 NtAllocateVirtualMemory 29877->29878 29880 36f0b4e 29878->29880 29879 36f0eee 29879->29868 29880->29879 29881 36f12b0 NtProtectVirtualMemory 29880->29881 29881->29879

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 0 36efe30-36efebe 1 36efec5-36eff3d 0->1 2 36effdb-36effe2 1->2 3 36eff43-36eff7a 1->3 2->1 5 36effe8-36f001a 2->5 3->2 4 36eff7c-36effa1 3->4 4->2 6 36effa3-36effd8 4->6 7 36f00ea-36f011a 5->7 8 36f0020-36f006b 5->8 6->2 10 36f024c-36f0253 7->10 11 36f0120-36f0165 7->11 8->7 9 36f006d-36f00b0 8->9 9->7 14 36f00b2-36f00e7 9->14 10->5 13 36f0259-36f027e 10->13 11->10 12 36f016b-36f01b3 11->12 12->10 15 36f01b9-36f01ff 12->15 16 36f03a8-36f03e2 13->16 17 36f0284-36f02c6 13->17 14->7 15->10 18 36f0201-36f021a 15->18 20 36f051b-36f0522 16->20 21 36f03e8-36f0439 16->21 17->16 19 36f02cc-36f02f3 17->19 18->10 23 36f021c-36f0249 18->23 19->16 24 36f02f9-36f0320 19->24 20->13 22 36f0528-36f052f 20->22 21->20 25 36f043f-36f0466 21->25 26 36f0769-36f07cb 22->26 27 36f0535-36f055f 22->27 23->10 24->16 28 36f0326-36f0353 24->28 25->20 29 36f046c-36f04b4 25->29 30 36f08f1-36f092d 26->30 31 36f07d1-36f07fb 26->31 32 36f062a-36f0678 27->32 33 36f0565-36f05a1 27->33 28->16 34 36f0355-36f03a5 28->34 29->20 35 36f04b6-36f04fb 29->35 39 36f092f-36f0948 30->39 40 36f0988-36f09dc 30->40 31->30 37 36f0801-36f0844 31->37 41 36f067e-36f06a0 32->41 42 36f0764 32->42 33->32 38 36f05a7-36f05d5 33->38 34->16 35->20 36 36f04fd-36f0518 35->36 36->20 37->30 43 36f084a-36f089c 37->43 38->32 44 36f05d7-36f0601 38->44 39->40 45 36f094a-36f0985 39->45 40->30 46 36f09e2-36f0a24 call 36d1c80 40->46 41->42 47 36f06a6-36f06d1 41->47 42->22 43->30 48 36f089e-36f08cf 43->48 44->32 49 36f0603-36f0627 44->49 45->40 55 36f0a2f-36f0a3b 46->55 47->42 51 36f06d7-36f071f 47->51 48->30 52 36f08d1-36f08ee 48->52 49->32 51->42 54 36f0721-36f073c 51->54 52->30 54->42 56 36f073e-36f0761 54->56 57 36f0af6-36f0b48 NtAllocateVirtualMemory 55->57 58 36f0a41-36f0a90 55->58 56->42 59 36f0b4e-36f0b8b 57->59 60 36f0c6c-36f0c7b 57->60 61 36f0a92-36f0ab1 58->61 62 36f0af1 58->62 59->60 65 36f0b91-36f0bca 59->65 66 36f0ef1-36f0f3f call 36d2ad0 60->66 67 36f0c81-36f0da7 call 36d2740 60->67 61->62 63 36f0ab3-36f0aee 61->63 62->55 63->62 65->60 68 36f0bd0-36f0c00 65->68 75 36f104b-36f12a0 66->75 76 36f0f45-36f0f7f 66->76 77 36f0db2-36f0dbd 67->77 68->60 71 36f0c02-36f0c32 68->71 71->60 74 36f0c34-36f0c69 71->74 74->60 76->75 78 36f0f85-36f0fc1 76->78 79 36f0dc3-36f0dfd 77->79 80 36f0e92-36f0eee call 36d3060 call 36f12b0 77->80 78->75 83 36f0fc7-36f1000 78->83 84 36f0e8d 79->84 85 36f0e03-36f0e4d 79->85 80->66 83->75 89 36f1002-36f1048 83->89 84->77 85->84 86 36f0e4f-36f0e8a 85->86 86->84 89->75
    APIs
    • NtAllocateVirtualMemory.NTDLL(000000FF,000127AD,00000000,0000B53F,0000E0E4,0357DAC4), ref: 036F0B1E
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID: AllocateMemoryVirtual
    • String ID: $,p$/D$M%$W$n$v"${l$b
    • API String ID: 2167126740-3272979823
    • Opcode ID: 0c81f735a92bdb3de164043c43fd5625e400dd0fde548237762064e1721788f3
    • Instruction ID: 6f1acaaf7978815ec4d976794e37b851bd0259a6bb1f845121a9f8d0c7df4638
    • Opcode Fuzzy Hash: 0c81f735a92bdb3de164043c43fd5625e400dd0fde548237762064e1721788f3
    • Instruction Fuzzy Hash: 24D268B0D002199FDB08CFA9D9959EEBBB1FF88304F24816AD519BB344D7386A81CF54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 92 36df790-36df973 call 36dbf70 call 36db8a0 97 36df97e-36df996 92->97 98 36df99c-36df9b5 97->98 99 36dfb70-36dfb7a 97->99 102 36df9b9-36df9d6 call 36ddeb0 98->102 103 36df9b7 98->103 107 36df9e1-36df9f3 102->107 103->97 108 36df9f5-36dfa12 107->108 109 36dfa14-36dfa8b call 36e9c30 LdrLoadDll 107->109 108->107 113 36dfb6b 109->113 114 36dfa91-36dfa98 109->114 113->99 114->113 115 36dfa9e-36dfaed call 36dc320 * 2 call 36cede0 114->115 122 36dfaef-36dfafb call 36d6ca0 115->122 123 36dfafe-36dfb4c RtlCreateUserThread 115->123 122->123 125 36dfb53-36dfb5b 123->125 127 36dfb5d-36dfb66 call 36d6ca0 125->127 128 36dfb69 125->128 127->128 128->99
    APIs
    • LdrLoadDll.NTDLL(00000000,00000000,?,00000000), ref: 036DFA80
    • RtlCreateUserThread.NTDLL(000000FF,00000000,00000000,00000000,00000000,00000000,Function_0015A760,00000000,?,?), ref: 036DFB33
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID: CreateLoadThreadUser
    • String ID: cmd.exe$explorer.exe$hh.exe$notepad.exe$regedit.exe$svchost.exe$winhlp32.exe$write.exe
    • API String ID: 3323402184-1645205526
    • Opcode ID: 23fa01cbad109634c820e7749751651c125e040200654f9697614b444d56e3c4
    • Instruction ID: 47337b5f185418ff87ca8e498c28007ac1079ef4e5dbf5d2c33657f0bd9f07cb
    • Opcode Fuzzy Hash: 23fa01cbad109634c820e7749751651c125e040200654f9697614b444d56e3c4
    • Instruction Fuzzy Hash: 22D13E74D083C8DEEB11CBA8D448BDEBFB26F16308F18419DD4452B386C7BA5659CB62

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 153 36f12b0-36f1384 call 36d3300 156 36f1387-36f138e 153->156 157 36f1565-36f15b9 156->157 158 36f1394-36f13dd 156->158 161 36f16df-36f1723 157->161 162 36f15bf-36f15fe 157->162 159 36f14e3-36f1519 158->159 160 36f13e3-36f1407 158->160 166 36f151b-36f155d 159->166 167 36f1560 159->167 160->159 165 36f140d-36f1452 160->165 163 36f185d-36f1864 161->163 164 36f1729-36f1760 161->164 162->161 168 36f1604-36f1649 162->168 163->157 172 36f186a-36f1887 NtProtectVirtualMemory 163->172 164->163 170 36f1766-36f179f 164->170 165->159 171 36f1458-36f147d 165->171 166->167 167->156 168->161 169 36f164f-36f1674 168->169 169->161 173 36f1676-36f16a9 169->173 170->163 174 36f17a5-36f17f6 170->174 171->159 175 36f147f-36f14b9 171->175 176 36f188a-36f1891 172->176 173->161 177 36f16ab-36f16dc 173->177 174->163 178 36f17f8-36f1832 174->178 175->159 179 36f14bb-36f14e0 175->179 180 36f1a8b-36f1a8f 176->180 181 36f1897-36f18ca 176->181 177->161 178->163 184 36f1834-36f185a 178->184 179->159 182 36f1a9a 180->182 183 36f1a91-36f1a98 180->183 185 36f19c6-36f1a12 181->185 186 36f18d0-36f190f 181->186 189 36f1aa1-36f1e40 182->189 183->189 184->163 187 36f1a86 185->187 188 36f1a14-36f1a48 185->188 186->185 190 36f1915-36f1949 186->190 187->176 188->187 191 36f1a4a-36f1a83 188->191 190->185 193 36f194b-36f1972 190->193 191->187 193->185 194 36f1974-36f19ad 193->194 194->185 195 36f19af-36f19c3 194->195 195->185
    APIs
    • NtProtectVirtualMemory.NTDLL(000000FF,0000AEDF,00014F70,000051D4,0000C496), ref: 036F1884
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID: MemoryProtectVirtual
    • String ID: E$PN$[v$C
    • API String ID: 2706961497-23083618
    • Opcode ID: 391a954e3a94ecc0067cbc1cc8c56d96df2eeea5d58033b772a631a3e0309a4a
    • Instruction ID: 80fa9d93a67f7d23701135eda51093924e66fba8739451c4839c40f709e50af6
    • Opcode Fuzzy Hash: 391a954e3a94ecc0067cbc1cc8c56d96df2eeea5d58033b772a631a3e0309a4a
    • Instruction Fuzzy Hash: 7F5266B0D01219DFDB08CFA9D9959EEBBB2BF88304F24816AE515BB344D7346A42CF54

    Control-flow Graph

    APIs
    • NtContinue.NTDLL(?,00000000,?,?,036DFA65,0357DADC,Function_0015B650), ref: 036E9C96
    • RtlAddVectoredExceptionHandler.NTDLL(0357DA54,036ECC20,?,?,036DFA65,0357DADC,Function_0015B650), ref: 036E9CBB
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID: ContinueExceptionHandlerVectored
    • String ID:
    • API String ID: 3817380991-0
    • Opcode ID: 29d9303fdfd8a73ad587d0f5dc668fa702b9be4ff86baa60f6eff077818df072
    • Instruction ID: 87a3a8afef13c54a429d840a9e9e286efc05bf7c5ce41890399abe2ceba581b4
    • Opcode Fuzzy Hash: 29d9303fdfd8a73ad587d0f5dc668fa702b9be4ff86baa60f6eff077818df072
    • Instruction Fuzzy Hash: 0611B778E04208EFDB04EFA8E559DAEB7F4FF48700F108599E809AB354C674AA45DF90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 290 36d85f0-36d868e call 36dbf70 NtContinue
    APIs
    • NtContinue.NTDLL(00000000,00000000), ref: 036D8677
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID: Continue
    • String ID:
    • API String ID: 3935651977-0
    • Opcode ID: 013da05257a3e0bf08c9110b7d8e3217554a3919e953627e79251bdbf3f3b6f6
    • Instruction ID: cc69288af8df80ed1c369dad5147fab0ca71f10e65b91c09608ffd7900a0c74a
    • Opcode Fuzzy Hash: 013da05257a3e0bf08c9110b7d8e3217554a3919e953627e79251bdbf3f3b6f6
    • Instruction Fuzzy Hash: 281195B8A00208EFDB04DF94D598BAEBBB1FF48704F208599D8056B385D775AE45DF80

    Control-flow Graph

    APIs
    • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000004), ref: 02F6025D
    • VirtualProtect.KERNELBASE(?,?,00000020,?), ref: 02F602B7
    • VirtualProtect.KERNELBASE(?,?,00000020,?), ref: 02F602D7
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141926010.0000000002F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f60000_Loader.jbxd
    Similarity
    • API ID: Virtual$Protect$Alloc
    • String ID: 028data$028entrypoint$028shell$028text$VirtualAlloc$VirtualProtect$kernel32.dll
    • API String ID: 2541858876-2564195007
    • Opcode ID: 83228f503a9f582f41d62f85800081b66e8d36cd2ae380decd0e5a74b9a06875
    • Instruction ID: 08b217d23cb8f791651b84aacc5eabc477825b77748b290789172aa844cda15a
    • Opcode Fuzzy Hash: 83228f503a9f582f41d62f85800081b66e8d36cd2ae380decd0e5a74b9a06875
    • Instruction Fuzzy Hash: 53B1FB70D082C8DEEF11C7E8C8487DDBFB56F16308F184199D1887B282D7BA5659CB66

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 196 36dbf70-36dc05e call 36d1620 199 36dc069-36dc075 196->199 200 36dc119-36dc148 call 36d3530 199->200 201 36dc07b-36dc09d 199->201 208 36dc153-36dc15e 200->208 203 36dc09f-36dc0c3 201->203 204 36dc114 201->204 203->204 205 36dc0c5-36dc111 203->205 204->199 205->204 209 36dc197-36dc313 GetProcessHeap RtlAllocateHeap 208->209 210 36dc160-36dc195 208->210 210->208
    APIs
    • GetProcessHeap.KERNEL32(00000008,000139C1), ref: 036DC1A5
    • RtlAllocateHeap.NTDLL(00000000), ref: 036DC1AC
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID: Heap$AllocateProcess
    • String ID: 0"$hb
    • API String ID: 1357844191-1558456265
    • Opcode ID: aa2314fe0bf9d1e8d7090be6d2a55398f615b45a2cb0c348496fe3e082edcca9
    • Instruction ID: 2202a70051b7401bc00d79c0a29d502275af817619a862c59c542a67d1bdceab
    • Opcode Fuzzy Hash: aa2314fe0bf9d1e8d7090be6d2a55398f615b45a2cb0c348496fe3e082edcca9
    • Instruction Fuzzy Hash: D2717DB0D0421DDFDB04CFD8D998AAEBBB1BF48308F148269D005BB288D7786A46CF54

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 213 1111ecf-1111ee0 call 1112720 216 1111ef1-1111ef8 213->216 217 1111ee2-1111ee8 213->217 219 1111f04-1111f18 dllmain_raw 216->219 220 1111efa-1111efd 216->220 217->216 218 1111eea-1111eec 217->218 221 1111fca-1111fd9 218->221 223 1111fc1-1111fc8 219->223 224 1111f1e-1111f23 call 1111cc5 219->224 220->219 222 1111eff-1111f02 220->222 225 1111f35-1111f47 call 1111c20 222->225 223->221 227 1111f28-1111f2f 224->227 230 1111f70-1111f72 225->230 231 1111f49-1111f4b 225->231 227->223 227->225 232 1111f74-1111f77 230->232 233 1111f79-1111f8a call 1111cc5 230->233 231->230 234 1111f4d-1111f6b call 1111c20 call 1111e1f dllmain_raw 231->234 232->223 232->233 233->223 240 1111f8c-1111fbe dllmain_raw 233->240 234->230 240->223
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: dllmain_raw
    • String ID:
    • API String ID: 3813456430-0
    • Opcode ID: 907db30afe28592688259a98519294382570c6c5db90c5563d5c49043e8066a7
    • Instruction ID: 61eb581c800fca4761e07184bfd00973cf456be67f2fcaee39f66c3051f0b875
    • Opcode Fuzzy Hash: 907db30afe28592688259a98519294382570c6c5db90c5563d5c49043e8066a7
    • Instruction Fuzzy Hash: 1C21E571D0022BBBDF2A9F39CC40EAFFA69EBA0694B014139FA1457218C3318D559BD2

    Control-flow Graph

    APIs
    • __RTC_Initialize.LIBCMT ref: 01111D65
      • Part of subcall function 011120F9: RtlInitializeSListHead.NTDLL(0116CAE0), ref: 011120FE
    • ___scrt_is_nonwritable_in_current_image.LIBCMT ref: 01111DCF
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Initialize$HeadList___scrt_is_nonwritable_in_current_image
    • String ID:
    • API String ID: 3231365870-0
    • Opcode ID: 5250a661b322473d5d418f40b048eb3c9bc3dc5805f79f9ae54330ee0ed90fa9
    • Instruction ID: 465822004732fa2167b312371d4b042d45e20d0845c81dfcc8e89967eecefd1a
    • Opcode Fuzzy Hash: 5250a661b322473d5d418f40b048eb3c9bc3dc5805f79f9ae54330ee0ed90fa9
    • Instruction Fuzzy Hash: 86212732684313AADF1DBBF8B405B9CFB619F26229F200439C6A1271C9DB721081C766

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 295 36d9940-36d9952 call 36d87b0 298 36d9958-36d997d CreateFileW 295->298 299 36d9954-36d9956 295->299 301 36d997f-36d9981 298->301 302 36d9983-36d9988 298->302 300 36d998d-36d9990 299->300 301->300 302->300
    APIs
    • CreateFileW.KERNELBASE(00000000,00000000,00000000,00000000,00000003,00000080,00000000), ref: 036D9973
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID: CreateFile
    • String ID:
    • API String ID: 823142352-0
    • Opcode ID: 5b2a7a54fa81b511c1f91b3869c231b9318a4e20827afa4fb6f4182aaaf6cfdb
    • Instruction ID: d10866fb27c05a529e0445b23a35b8de45987466926da725d3c917a8323b5fec
    • Opcode Fuzzy Hash: 5b2a7a54fa81b511c1f91b3869c231b9318a4e20827afa4fb6f4182aaaf6cfdb
    • Instruction Fuzzy Hash: 42F01234E50309FBD720DFB49905B6DB7F4AB04710F1446A8E952AF2C0D67166459B84

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 303 111200d-1112015 305 1112017 call 11120ae 303->305 306 111201c-1112025 call 1111ecf 303->306 305->306 309 111202a-111202e 306->309
    APIs
    • ___security_init_cookie.LIBCMT ref: 01112017
      • Part of subcall function 011120AE: ___get_entropy.LIBCMT ref: 011120C8
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ___get_entropy___security_init_cookie
    • String ID:
    • API String ID: 864368843-0
    • Opcode ID: 38a8115a88cc7ea42df35cfebbd135a0407f23b021b086826ff78ae53b35049e
    • Instruction ID: 612c7138f57c43012483788155172a79635bee9a3cd053ee842d8f9394ac6ed8
    • Opcode Fuzzy Hash: 38a8115a88cc7ea42df35cfebbd135a0407f23b021b086826ff78ae53b35049e
    • Instruction Fuzzy Hash: 2CD0CA3280001DFBCF2A6FA0DC0589DBB22AB20224B208238F918180248B328260EF02

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 310 111200e-1112015 311 1112017 call 11120ae 310->311 312 111201c-1112025 call 1111ecf 310->312 311->312 315 111202a-111202e 312->315
    APIs
    • ___security_init_cookie.LIBCMT ref: 01112017
      • Part of subcall function 011120AE: ___get_entropy.LIBCMT ref: 011120C8
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ___get_entropy___security_init_cookie
    • String ID:
    • API String ID: 864368843-0
    • Opcode ID: 8e3dc87434a601cdc3d07f34a8ffaf66e8656ff63a3baeda67220093dea37a90
    • Instruction ID: bd68112684e2bd8a24c2e9a4a94173b6b2f29a3c9ef0daffdf016b1bdb44dce5
    • Opcode Fuzzy Hash: 8e3dc87434a601cdc3d07f34a8ffaf66e8656ff63a3baeda67220093dea37a90
    • Instruction Fuzzy Hash: 76C0123240020DFBCF0A6F90DD009AEBBABAB20224F50C134FA18080249732C670EB92
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: .v$:m$:m$:$O6$d$e|$m$T
    • API String ID: 0-1297523147
    • Opcode ID: 7810630a227974c3693c00c5d33abf6db4366635c9c326adacae79a6464061c9
    • Instruction ID: 226237d1f4bdfd06c38784874801a630a17f90d6afee83f32d9ef48f1fc0d3ba
    • Opcode Fuzzy Hash: 7810630a227974c3693c00c5d33abf6db4366635c9c326adacae79a6464061c9
    • Instruction Fuzzy Hash: 831357B0D016199FDB08CFA9D9959EEBBB2FF88304F24816AE415BB344D7386A41CF54
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141926010.0000000002F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f60000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: $,p$/D$M%$W$n$v"${l$b
    • API String ID: 0-3272979823
    • Opcode ID: 3e35df64f1dffea0fba1e76d10e467ac626c9e4ec211c680c70c52c00be5c575
    • Instruction ID: 5a56377d0a92f386c248dc31bf571460bb19dc6a1518f03a4e7bbe4dad429818
    • Opcode Fuzzy Hash: 3e35df64f1dffea0fba1e76d10e467ac626c9e4ec211c680c70c52c00be5c575
    • Instruction Fuzzy Hash: E1D249B4D01219DFDB08CFA9D9959EEBBB2FF88304F24816AD419BB244D7346A81CF54
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141926010.0000000002F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f60000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: [$&+$G$^=$_$`k$r=$q
    • API String ID: 0-4071359380
    • Opcode ID: 2b3b9079b957356a2c337bd71133b8d292d0ab930f8f3571a2f3ce08eb2b3eb3
    • Instruction ID: b020bf1170e3e5d1d0a7d2107dc8e1fee46988d3f7f1d93a0f4ac5f5de4cea1c
    • Opcode Fuzzy Hash: 2b3b9079b957356a2c337bd71133b8d292d0ab930f8f3571a2f3ce08eb2b3eb3
    • Instruction Fuzzy Hash: 157277B0D11619DFDB08CFA8D9959EEBBB2FF88304F24816AE415BB244D7386A41CF54
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: [$&+$G$^=$_$`k$r=$q
    • API String ID: 0-4071359380
    • Opcode ID: c70f3095cf9cdad89dbaf3359ea3d461cc370fada9a17a392e2b65bf2313c7f1
    • Instruction ID: 410f3bcbf4a45a7da484c8bdb1d955deab3d28d38cc3dea728fe6e13a6577b06
    • Opcode Fuzzy Hash: c70f3095cf9cdad89dbaf3359ea3d461cc370fada9a17a392e2b65bf2313c7f1
    • Instruction Fuzzy Hash: 137269B0D016199FDB08CFA8DA959EEBBB2FF88304F248169E415BB344D7386A45CF54
    APIs
    • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 01151659
    • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 01151682
    • GetACP.KERNEL32 ref: 01151697
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID: ACP$OCP
    • API String ID: 2299586839-711371036
    • Opcode ID: 942d472357195f40f5c293878e4595bbfb4a65b864300a7f916b7fa389235d12
    • Instruction ID: e4725d4aa7b20fea202b6f4b67484eb60cf26c22b25a7ac5adf3986d839d3b02
    • Opcode Fuzzy Hash: 942d472357195f40f5c293878e4595bbfb4a65b864300a7f916b7fa389235d12
    • Instruction Fuzzy Hash: DD21B666600201FAEB7F8F68C905BE777A7AB40E54B4E8464ED2AD7105F7B2D940C370
    APIs
      • Part of subcall function 0113D47A: GetLastError.KERNEL32(00000000,?,01142747), ref: 0113D47E
      • Part of subcall function 0113D47A: SetLastError.KERNEL32(00000000,?,?,00000028,0111F899), ref: 0113D520
    • GetUserDefaultLCID.KERNEL32 ref: 011518A4
    • IsValidCodePage.KERNEL32(00000000), ref: 011518E2
    • IsValidLocale.KERNEL32(?,00000001), ref: 011518F5
    • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 0115193D
    • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 01151958
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
    • String ID:
    • API String ID: 415426439-0
    • Opcode ID: b288b211acb1c813e2154183cf9b606828e0ac5f17fd96a688bd486b81003422
    • Instruction ID: 922021551a3aa3c4e8b741c9b8f354681bfe1b557f1c657aaf6b0a3680701b89
    • Opcode Fuzzy Hash: b288b211acb1c813e2154183cf9b606828e0ac5f17fd96a688bd486b81003422
    • Instruction Fuzzy Hash: F3518071A00206FBEB6ADFA9DC85BBE77B8BF15700F044569EE21E7150E7709540CB61
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: ,$*e$e$px$w`
    • API String ID: 0-3197299803
    • Opcode ID: 2df168d4d14f58df77b78b96a8ddebc828c98ab4d78808a64b9b552d5ab93529
    • Instruction ID: 374e44a0033f3e8de9f4fd482a3eb5c37e574d3feecc52bf2656031c2f1cc323
    • Opcode Fuzzy Hash: 2df168d4d14f58df77b78b96a8ddebc828c98ab4d78808a64b9b552d5ab93529
    • Instruction Fuzzy Hash: 788268B0D016199FDB08CFA9D9959EEBBB2FF88304F248169E415BB344D7386A41CF58
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f6a484541b56190ed5c905c45ba7956b897675f31433f8d0abb24f07cc6cfebd
    • Instruction ID: 2726bac6d50fd78d462d8b77fbeea9b28c3b00303e72f2911556caf541c243e7
    • Opcode Fuzzy Hash: f6a484541b56190ed5c905c45ba7956b897675f31433f8d0abb24f07cc6cfebd
    • Instruction Fuzzy Hash: A4023D75E012199BDF18CFA9C890BAEBBB1FF49714F248269D919E7341D731AA01CB90
    APIs
    • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 0113E933
    • FindNextFileW.KERNEL32(00000000,?), ref: 0113E9AE
    • FindClose.KERNEL32(00000000), ref: 0113E9D0
    • FindClose.KERNEL32(00000000), ref: 0113E9F3
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Find$CloseFile$FirstNext
    • String ID:
    • API String ID: 1164774033-0
    • Opcode ID: f3a2e4594817f91bf0795632e3c2122b3ea74253f080027ee8552e888097e5b9
    • Instruction ID: f22ad9e5be3ba770d44467bc037f96b1bb1171a1b1b2f5f6e139f8500c1a4b12
    • Opcode Fuzzy Hash: f3a2e4594817f91bf0795632e3c2122b3ea74253f080027ee8552e888097e5b9
    • Instruction Fuzzy Hash: 4641C671D023299EDF39EFA8DC88AAAB779EFC5205F0041D5E405E7189F7309E848B61
    APIs
    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 011124D5
    • IsDebuggerPresent.KERNEL32 ref: 011125A1
    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 011125BA
    • UnhandledExceptionFilter.KERNEL32(?), ref: 011125C4
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
    • String ID:
    • API String ID: 254469556-0
    • Opcode ID: a90af6685a3742a52529f39c1e2935b772e804f4caca6cf9a6260996f350c257
    • Instruction ID: 3eba118c0f80686d5f5fca24cd0f2cfa58236484b2a86f48681fd541e2d80ba6
    • Opcode Fuzzy Hash: a90af6685a3742a52529f39c1e2935b772e804f4caca6cf9a6260996f350c257
    • Instruction Fuzzy Hash: 06310575D01219DADF24DFA4D9497CDBBB8AF08300F1041AAE80CAB244EB709A85CF44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141926010.0000000002F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f60000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: E$PN$[v$C
    • API String ID: 0-23083618
    • Opcode ID: b846a00175a895f70f09af5a958be3e956c0569e0aef1e3c2bbc89ce06a238e5
    • Instruction ID: 27157c80cf022e972dda626b55a100f8191b52c4dca5d71170ade02c0de6955a
    • Opcode Fuzzy Hash: b846a00175a895f70f09af5a958be3e956c0569e0aef1e3c2bbc89ce06a238e5
    • Instruction Fuzzy Hash: 6C5266B4D012199FDB08CFA9D9959EEBBF2FF88304F24816AE415BB244D7386A41CF54
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: @u$M.$Y%$aK
    • API String ID: 0-3285596633
    • Opcode ID: a625395b8a7b85c1e55c8fee7644929e870bc2fd41024a9167482793f2fc6054
    • Instruction ID: b341d2dc1a1da9043929474de3403499c9031523e97ed355d7fa032d61bea82b
    • Opcode Fuzzy Hash: a625395b8a7b85c1e55c8fee7644929e870bc2fd41024a9167482793f2fc6054
    • Instruction Fuzzy Hash: D65279B0D00618DFDB18CFA9D995AEDBBB1FF88304F248169D019AB345D7386A86CF54
    APIs
      • Part of subcall function 0113D47A: GetLastError.KERNEL32(00000000,?,01142747), ref: 0113D47E
      • Part of subcall function 0113D47A: SetLastError.KERNEL32(00000000,?,?,00000028,0111F899), ref: 0113D520
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 01151298
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 011512E2
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 011513A8
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: InfoLocale$ErrorLast
    • String ID:
    • API String ID: 661929714-0
    • Opcode ID: e86c371b7a1bf581cce8ae3778e8a5329d6a358e6b82b644be76a51e2fc29e85
    • Instruction ID: d86e0b5503c59453b346e80a7db64045b9c7be5bebde5ecac0ebd31ddb9c5898
    • Opcode Fuzzy Hash: e86c371b7a1bf581cce8ae3778e8a5329d6a358e6b82b644be76a51e2fc29e85
    • Instruction Fuzzy Hash: BC619F71904207EFEBAE9F28CC91BAA7BB8EF04314F144179ED25CA586E774D981CB50
    APIs
    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 0113DBCE
    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 0113DBD8
    • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 0113DBE5
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled$DebuggerPresent
    • String ID:
    • API String ID: 3906539128-0
    • Opcode ID: 6c80d12a28fd62bd1163b15ec545e7d926ed433aa71a56b5b3fe01e60a38405f
    • Instruction ID: 7f96fe135f3d41391e32bd66da9608a75539e800ad57983e3c5ea6f316bfbe86
    • Opcode Fuzzy Hash: 6c80d12a28fd62bd1163b15ec545e7d926ed433aa71a56b5b3fe01e60a38405f
    • Instruction Fuzzy Hash: 4731C57491122D9BCF25DF68D98878DBBB8BF48310F5041EAE81CA7294EB709B858F44
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141926010.0000000002F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f60000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: D+$b}$uu
    • API String ID: 0-2931196776
    • Opcode ID: e71fa48afa4b9799a567f57c11f943e2c386d3f7de76671fb664c98cb8ffa6fe
    • Instruction ID: 005c25bb51e334d43d9178ed9f0214de917b7476640f8f651a773c8235ed179a
    • Opcode Fuzzy Hash: e71fa48afa4b9799a567f57c11f943e2c386d3f7de76671fb664c98cb8ffa6fe
    • Instruction Fuzzy Hash: 293266B4D012199FDB08CFA9D9959EEFBB1FF88304F24816AE415BB244D7386A42CF54
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: D+$b}$uu
    • API String ID: 0-2931196776
    • Opcode ID: e71fa48afa4b9799a567f57c11f943e2c386d3f7de76671fb664c98cb8ffa6fe
    • Instruction ID: e545ed898a77d93d49cee4cce7b0dbfb6ea203a358af547d27ffa25b07805ab1
    • Opcode Fuzzy Hash: e71fa48afa4b9799a567f57c11f943e2c386d3f7de76671fb664c98cb8ffa6fe
    • Instruction Fuzzy Hash: 5D3256B4D012199FDB08CF99D9959EEBBB1FF88304F24816AD415BB348D7386A42CF94
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141926010.0000000002F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f60000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: %L$-
    • API String ID: 0-412675669
    • Opcode ID: e04c98860c95100e425c153fe435bde9fb3e53c313b9709fd8aac779154b8373
    • Instruction ID: 9c2e04b6b569c023cf3e38b1be40919b6f0479478bb783ac46d391fbc58a654b
    • Opcode Fuzzy Hash: e04c98860c95100e425c153fe435bde9fb3e53c313b9709fd8aac779154b8373
    • Instruction Fuzzy Hash: 85A27BB0D11609DFDB08CF99D995AEEBBB1FF88304F24816AE415BB244D738AA41CF54
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: %L$-
    • API String ID: 0-412675669
    • Opcode ID: e04c98860c95100e425c153fe435bde9fb3e53c313b9709fd8aac779154b8373
    • Instruction ID: 39660e49bd402ea66493a143024f507268e11c216356d2a585223381c0c9614c
    • Opcode Fuzzy Hash: e04c98860c95100e425c153fe435bde9fb3e53c313b9709fd8aac779154b8373
    • Instruction Fuzzy Hash: 7BA27AB0D016099FDB08CF99D9959EEBBB2FF88304F24816AE415BB348D7386A51CF54
    APIs
    • GetProcessHeap.KERNEL32 ref: 011110AC
    • RtlAllocateHeap.NTDLL(0116CAC8,?,?), ref: 011110C6
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Heap$AllocateProcess
    • String ID:
    • API String ID: 1357844191-0
    • Opcode ID: 3728c49f917234a8095207467f1e89422636e5c5e1279602d0de7a782e1823c3
    • Instruction ID: 32aac7c6c9df4d3c96d99cfa9ae52e8126d2e7d13874db41d9983ad53a3e8be4
    • Opcode Fuzzy Hash: 3728c49f917234a8095207467f1e89422636e5c5e1279602d0de7a782e1823c3
    • Instruction Fuzzy Hash: 15D05E7A100208EFCB68DF98F484B5937A8B748310F444035F66CC2618D73194C0CB95
    APIs
    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,01155EF2,?,?,00000008,?,?,01151A6C,00000000), ref: 01156124
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ExceptionRaise
    • String ID:
    • API String ID: 3997070919-0
    • Opcode ID: 0d6a22b742089d726fba0915dcf2e7ea5765a56f36f0a22e238abed640adeabf
    • Instruction ID: 4ef014ee72e9123998269c0d959e8305ea9e15f9d1b5e23493516fb9c2be700d
    • Opcode Fuzzy Hash: 0d6a22b742089d726fba0915dcf2e7ea5765a56f36f0a22e238abed640adeabf
    • Instruction Fuzzy Hash: FFB13931210608DFE759CF2CC48AB657FA1FF45364F658658E9A9CF2A2C335E981CB80
    APIs
    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 01112B8C
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: FeaturePresentProcessor
    • String ID:
    • API String ID: 2325560087-0
    • Opcode ID: 144be54985dd128685ac9e101085657811f5dbde6d9b73ea9441401fe3903f00
    • Instruction ID: 08af1ef24ad9e1db7d56f7064c36d3f2185a841cd52d072a99709bacdecf6ee9
    • Opcode Fuzzy Hash: 144be54985dd128685ac9e101085657811f5dbde6d9b73ea9441401fe3903f00
    • Instruction Fuzzy Hash: 55A16AB6A013158FDB2CCF58D8817ADBBB1FB49324F24813AD565E72A8D3359980CF94
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 0e30283854f4742f1e045181577e8ff2942cd622fa071a2efc0c219a83654ff5
    • Instruction ID: 7cb549e1ba209fe590628cbed27475986261ab33a35d3a30038e0f3dc3f5e370
    • Opcode Fuzzy Hash: 0e30283854f4742f1e045181577e8ff2942cd622fa071a2efc0c219a83654ff5
    • Instruction Fuzzy Hash: 35D1DD74A246068FDB2DCF6CC484A7EBBB0FF84314B14861DD566DB399CB30A942CB59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: c3119f712276389607c6a09dd338044141ccd34ebfe6ac42ad7ca3ae200bf80d
    • Instruction ID: 40f0f4cd9f55298ce0c7a3ed9b38e6e6e7fe1d76b3bbe03e71ca42e9a7e000de
    • Opcode Fuzzy Hash: c3119f712276389607c6a09dd338044141ccd34ebfe6ac42ad7ca3ae200bf80d
    • Instruction Fuzzy Hash: B2D1E0B0A206068FDB2DCF6CC58067ABBB1FF88314B14465DD5669B398D331E942CB59
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 24593f6789661f2d797a05af9de06d0f24605786899f108e029b63ab7cc7f401
    • Instruction ID: f247fddb88fd95661ced18f98cf6e6a94dd11b7f5f442d391a0efa59add76e5e
    • Opcode Fuzzy Hash: 24593f6789661f2d797a05af9de06d0f24605786899f108e029b63ab7cc7f401
    • Instruction Fuzzy Hash: B8D10E34A106068FDB2DEF6CC580A7AFBB1FFC9314F14461DD6669B698C330A942CB56
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: a5b48075ceea4356827be6f30c9e30580564d9514a5193f6887aa2abef8bde51
    • Instruction ID: 01db65feb8b866c9fdcb79d11473734d51c748bd4456fd5386413820eb3dc21c
    • Opcode Fuzzy Hash: a5b48075ceea4356827be6f30c9e30580564d9514a5193f6887aa2abef8bde51
    • Instruction Fuzzy Hash: 4BC12630900606AFDB2EDF6CC4986BABBB6FFD5304F044628D55297699C331E949CB62
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 47a401445dda7cceb1a93e137e8c3b06ef317ab6b19a4df1ee1e286dacac28dd
    • Instruction ID: 7fa1f9be8da49e3966d578d1392081f73ea0acf87ac7161bbc52c35418384a2f
    • Opcode Fuzzy Hash: 47a401445dda7cceb1a93e137e8c3b06ef317ab6b19a4df1ee1e286dacac28dd
    • Instruction Fuzzy Hash: 41C12238A047069FDB2DEF6CCA84A7EBBB1FF89304F144618CA5297299C331E945CB51
    APIs
      • Part of subcall function 0113D47A: GetLastError.KERNEL32(00000000,?,01142747), ref: 0113D47E
      • Part of subcall function 0113D47A: SetLastError.KERNEL32(00000000,?,?,00000028,0111F899), ref: 0113D520
    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 011514EB
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID:
    • API String ID: 3736152602-0
    • Opcode ID: c1019d51be8a40ba15fe0256142c3bc1442d1319d0f2cb56541ae6a1a6b8b718
    • Instruction ID: 08bb167d1483128b41d774080fb2edafc09d90c558f69ea20cdd3c88d27e3766
    • Opcode Fuzzy Hash: c1019d51be8a40ba15fe0256142c3bc1442d1319d0f2cb56541ae6a1a6b8b718
    • Instruction Fuzzy Hash: 5821D472621206FBDF6E9A69DC81BBA77ACEF45318F15007AED22C7140EB34E940CB50
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: a15366f969398463b0eebbd2ff31f78554085fed59f74bde083a1eb48b51aaa1
    • Instruction ID: e6b15b3503ca4c936b736f2bd750266ed3a10be5272c81d861d820f5b084aa35
    • Opcode Fuzzy Hash: a15366f969398463b0eebbd2ff31f78554085fed59f74bde083a1eb48b51aaa1
    • Instruction Fuzzy Hash: 02C1117090064AAFDB2DCF6CC5846BABBF1EF86315F084A19C59297299D331E946CB11
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: bff85b3fac3dc40ffab68dc06fd6b6208dc44d9014c3af603bc7c249b2f5261d
    • Instruction ID: 44c7f0b21bde35a29d4a5e7605dd14504fb4c36c39b62a3301402f584175646b
    • Opcode Fuzzy Hash: bff85b3fac3dc40ffab68dc06fd6b6208dc44d9014c3af603bc7c249b2f5261d
    • Instruction Fuzzy Hash: C2B1F130A0061A9BDF3DEFACC544ABEBBF1BFC4614F04451DE642A7698D730A946CB51
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 8867e969ef836f5487f8d6ff8a44d4ff15b17ecd84d93723b0abe8a0330b1fce
    • Instruction ID: 4b7388a313829ff40c8f3af7fff590c0e2b65781b4f04aede4f74cf61f93ed92
    • Opcode Fuzzy Hash: 8867e969ef836f5487f8d6ff8a44d4ff15b17ecd84d93723b0abe8a0330b1fce
    • Instruction Fuzzy Hash: 33B1F170A0070A8BDB2DEF6CC994ABEBBF1BFD8214F00461DD546A7698D730EA45CB51
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: f318f7a0ea5154224fd230120779b828aea0bada24fd5b294b4694f73d0bc6d7
    • Instruction ID: 1b82bfc5a64512b3a7f4cae4f79f9e46638292ccca7893e29ba9bdd12c2b6b82
    • Opcode Fuzzy Hash: f318f7a0ea5154224fd230120779b828aea0bada24fd5b294b4694f73d0bc6d7
    • Instruction Fuzzy Hash: 26B1E030A0070ACBDB2DEFACC594ABEBBB1EFC4214F04451DD556A769CD730A942CB52
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 1b7eb949c810ecf483787684acde7091239cda256cb9f79407875a6e5216f548
    • Instruction ID: d37e8a00d94c6b045272c1d63cd62172c156b771e09dcd99d179ce4230881f91
    • Opcode Fuzzy Hash: 1b7eb949c810ecf483787684acde7091239cda256cb9f79407875a6e5216f548
    • Instruction Fuzzy Hash: 4EB1F070A0460BABDF2CCF6CC5946BEBBB5AFC1314F084619D952E7699CB70D602CB52
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: 7ce20850da29ae6e7e84ce7add72343d53709ed4f9ea8d875410c6ec97b2c4ba
    • Instruction ID: 7f642f0f3da08945fbb44367da8e0686e451525199344464fe32bed13d1648c1
    • Opcode Fuzzy Hash: 7ce20850da29ae6e7e84ce7add72343d53709ed4f9ea8d875410c6ec97b2c4ba
    • Instruction Fuzzy Hash: 91B1E370A0464BABDB2CCE7CC8546FEBFB1AFC4314F140619DA92E7698C731A501CB55
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: 0
    • API String ID: 0-4108050209
    • Opcode ID: fbf78d7c2c622c1a7272ceb44cdc16bcdf83d46cd9557f4cf468d0a56f71e71e
    • Instruction ID: d2f970f9492d9aac3b2573c5d20e9d9b98dd56f0ac56cf4faafa06eefbc7e575
    • Opcode Fuzzy Hash: fbf78d7c2c622c1a7272ceb44cdc16bcdf83d46cd9557f4cf468d0a56f71e71e
    • Instruction Fuzzy Hash: 0FB11370900A0BABDB3DCF6CC9546BEBBB1AFC5314F08061ED592A7698D730E606CB51
    APIs
      • Part of subcall function 0113D47A: GetLastError.KERNEL32(00000000,?,01142747), ref: 0113D47E
      • Part of subcall function 0113D47A: SetLastError.KERNEL32(00000000,?,?,00000028,0111F899), ref: 0113D520
    • EnumSystemLocalesW.KERNEL32(01151244,00000001), ref: 01151190
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: fdadc21d54501a3c3c16f97a9e05572de1ef69a2722654f5d35e2790c48c3853
    • Instruction ID: c7a9e38b30a42595591bc047386b780a1746daada95a7aba3fecc26ccd7bd26d
    • Opcode Fuzzy Hash: fdadc21d54501a3c3c16f97a9e05572de1ef69a2722654f5d35e2790c48c3853
    • Instruction Fuzzy Hash: 9E11027A200305AFDB1D9F3988D16BABBA1FB80358B19852CE99687A00D371A842CB40
    APIs
      • Part of subcall function 0113D47A: GetLastError.KERNEL32(00000000,?,01142747), ref: 0113D47E
      • Part of subcall function 0113D47A: SetLastError.KERNEL32(00000000,?,?,00000028,0111F899), ref: 0113D520
    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,01151460,00000000,00000000,?), ref: 011516F2
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ErrorLast$InfoLocale
    • String ID:
    • API String ID: 3736152602-0
    • Opcode ID: 08e934b7401526fa592a0530499d511d6e513bee78440b7de478f1334d099812
    • Instruction ID: 2954b29f41b00abd5e6d2f452e24027b1a5b0094da6a06c214b68c3b632f519a
    • Opcode Fuzzy Hash: 08e934b7401526fa592a0530499d511d6e513bee78440b7de478f1334d099812
    • Instruction Fuzzy Hash: 1701D636610612FBDF2D9A688C46BBA3B68EB40654F054438ED66A3180EB30FD41C690
    APIs
      • Part of subcall function 0113D47A: GetLastError.KERNEL32(00000000,?,01142747), ref: 0113D47E
      • Part of subcall function 0113D47A: SetLastError.KERNEL32(00000000,?,?,00000028,0111F899), ref: 0113D520
    • EnumSystemLocalesW.KERNEL32(01151497,00000001), ref: 01151203
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: 31005bdc3cd2425f7174ad4130f54ce4ddb21c4e2a481b26188514bc19355f7b
    • Instruction ID: fb65dbe5720aeaddadd72d0aaaf7e2f167998ef956766034ebd90b07c1e39636
    • Opcode Fuzzy Hash: 31005bdc3cd2425f7174ad4130f54ce4ddb21c4e2a481b26188514bc19355f7b
    • Instruction Fuzzy Hash: 7FF04C76200308AFDB296F7998C0B767F95FF80368B15442CFD5587540C7716841CB50
    APIs
      • Part of subcall function 0113CBD2: RtlEnterCriticalSection.NTDLL(-0001B7A7), ref: 0113CBE1
    • EnumSystemLocalesW.KERNEL32(Function_0002FE97,00000001,0116A8A8,0000000C), ref: 01140EE2
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: CriticalEnterEnumLocalesSectionSystem
    • String ID:
    • API String ID: 1272433827-0
    • Opcode ID: 8c1a2231530133bbaf150bf2eaa9ba1676c40867772e9fcfedab255e1930766d
    • Instruction ID: 245e675eb618f82cb4c1b0e151792994732612f08067e48bc851ad7678716272
    • Opcode Fuzzy Hash: 8c1a2231530133bbaf150bf2eaa9ba1676c40867772e9fcfedab255e1930766d
    • Instruction Fuzzy Hash: B2F0A932A00205DFDB18DFA9E401B8D77F0FB58725F10812AF514EB290C776A9408F51
    APIs
      • Part of subcall function 0113D47A: GetLastError.KERNEL32(00000000,?,01142747), ref: 0113D47E
      • Part of subcall function 0113D47A: SetLastError.KERNEL32(00000000,?,?,00000028,0111F899), ref: 0113D520
    • EnumSystemLocalesW.KERNEL32(0115100E,00000001), ref: 011510EC
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ErrorLast$EnumLocalesSystem
    • String ID:
    • API String ID: 2417226690-0
    • Opcode ID: 7fd347524dffe11a68a7c26d178d0e540d0568105a2e60efb85ea90fc1c7f477
    • Instruction ID: 19041c29312133ec9b37bea3082848ad82f8c558786554e5ebb79ea5200b1c5f
    • Opcode Fuzzy Hash: 7fd347524dffe11a68a7c26d178d0e540d0568105a2e60efb85ea90fc1c7f477
    • Instruction Fuzzy Hash: 2BF05C35300345A7CB199F39D8457667F90EFC1654B06405CEE158B150C3729482C750
    APIs
    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,?,?), ref: 011419C4
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: InfoLocale
    • String ID:
    • API String ID: 2299586839-0
    • Opcode ID: 86a1dedff4fa473ed81ae86a2afc35cb02f5118e4b8a473cf2931d87e965e135
    • Instruction ID: 21ee53e30d338b876858f6400105c7c1df36fea27c2c5083fb92a77f2cab3212
    • Opcode Fuzzy Hash: 86a1dedff4fa473ed81ae86a2afc35cb02f5118e4b8a473cf2931d87e965e135
    • Instruction Fuzzy Hash: D3E04F7650022CBBCF1A2FA0EC04E9E3E2AFF54B51F014021FD1565120DB32A9A19BD5
    APIs
    • EnumSystemLocalesW.KERNEL32(Function_0002FE97,00000001), ref: 01141063
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: EnumLocalesSystem
    • String ID:
    • API String ID: 2099609381-0
    • Opcode ID: 91ef72ca6300c545797e772b5aa7cd891cc28a0b2a28ef3b3a47edd3e0f31a94
    • Instruction ID: 900fe921a85ea74982e0220148d4bdb83edef4391e7c32b5b261ad97ecf78ac4
    • Opcode Fuzzy Hash: 91ef72ca6300c545797e772b5aa7cd891cc28a0b2a28ef3b3a47edd3e0f31a94
    • Instruction Fuzzy Hash: C6D05E31105304ABCF2C5BA2F505A803B99F348754B000039F55C06795DB73B8808B40
    APIs
    • SetUnhandledExceptionFilter.KERNEL32(Function_00001668), ref: 0111265E
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ExceptionFilterUnhandled
    • String ID:
    • API String ID: 3192549508-0
    • Opcode ID: 39d9117d891d6ea7b04508ae654dde16cbde9989921f0e2592efb7bdb5d538a0
    • Instruction ID: 6aa0768ac6ac119648f75eed0259470b2c5fdf89c96414e1bd1e1bc6036aca73
    • Opcode Fuzzy Hash: 39d9117d891d6ea7b04508ae654dde16cbde9989921f0e2592efb7bdb5d538a0
    • Instruction Fuzzy Hash:
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4142318815.000000000357E000.00000020.00001000.00020000.00000000.sdmp, Offset: 0357E000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_357e000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: Q.
    • API String ID: 0-1051685669
    • Opcode ID: be3ecdb16c3f598ed2548b2bba623acb1031ea13949f5db27b26e21a2a093abe
    • Instruction ID: eb43b97f0bb27ddf2d1a00649833d89db8f14d12ada1fb708d84cf849fd427ec
    • Opcode Fuzzy Hash: be3ecdb16c3f598ed2548b2bba623acb1031ea13949f5db27b26e21a2a093abe
    • Instruction Fuzzy Hash: E17199B4D012099FDF04CF98D9949EEBBB1FF48308F108169E819AB344C778AA55CF98
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3c48c4ae7fb3c8dc4237112ba9dd4124f457e8650bae2c8356ce750ac910de63
    • Instruction ID: ba258ddb5f8c2605495577a5b6dac208b33b7a1c475ba72bb8ac5c7f0576b6a8
    • Opcode Fuzzy Hash: 3c48c4ae7fb3c8dc4237112ba9dd4124f457e8650bae2c8356ce750ac910de63
    • Instruction Fuzzy Hash: DAF18071A012299FDB29DF18C890BAAB7B9FF46B04F1400EAD949A7345E7715F818FC1
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4db82edd64cb1af7cfb90950166cae697cdf200776af2b583b8769fbd88ce2ea
    • Instruction ID: ae3934457b6b9d95007e6106c2806f235e2b1633dcd573c46d4d760278d18e93
    • Opcode Fuzzy Hash: 4db82edd64cb1af7cfb90950166cae697cdf200776af2b583b8769fbd88ce2ea
    • Instruction Fuzzy Hash: DEB1CF20D2AF518DD72799398431336FA9CAFBB2D5B51D72BFC2670D5AEB2181C34280
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c9f704e83e07128fa0ba674abda326634586ff0bde3e6be2a5995f54308d7591
    • Instruction ID: 4bc2a0dbe2f96209aac370352537adad4c632c51bc52a7474cd3c121ce79f70e
    • Opcode Fuzzy Hash: c9f704e83e07128fa0ba674abda326634586ff0bde3e6be2a5995f54308d7591
    • Instruction Fuzzy Hash: 4AA15E72A012298BDB29CF18C890BEDB7B5FF89714F1545EAD909A7341D771AE818FC0
    Memory Dump Source
    • Source File: 00000000.00000002.4141926010.0000000002F60000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F60000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_2f60000_Loader.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 9bcf609f7e593687e09549c7d8e547f9bc53d275433b23cdcb5ecd32cbab4405
    • Instruction ID: 002765da08ccd7ead9ca0d517826674c118afedd358eb63c73d09637cfcb989f
    • Opcode Fuzzy Hash: 9bcf609f7e593687e09549c7d8e547f9bc53d275433b23cdcb5ecd32cbab4405
    • Instruction Fuzzy Hash: 8411F875E01208EFCB04CF98C994AAEBBB5FF88304F208499D905A7704EB35AE41CF90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name::operator+$NameName::$Decorator::getReturnTypeoperator+
    • String ID:
    • API String ID: 2932655852-0
    • Opcode ID: 9951886f064034d25f75f4990dbb9173c426c608e184611167cb53e98c59a3f3
    • Instruction ID: 3b15c23f0672e912e10bbff81e222d09b8907ce8a314789abe7f18a96a26022b
    • Opcode Fuzzy Hash: 9951886f064034d25f75f4990dbb9173c426c608e184611167cb53e98c59a3f3
    • Instruction Fuzzy Hash: 27C18471900219AFDB1CDF98D890EEEFBB8FB18714F044079E652A7398EB719A44CB51
    APIs
    • DName::operator+.LIBCMT ref: 01118EA7
    • DName::operator+.LIBCMT ref: 01118FEA
      • Part of subcall function 0111489A: shared_ptr.LIBCMT ref: 011148B6
    • DName::operator+.LIBCMT ref: 01118F95
    • DName::operator+.LIBCMT ref: 01119036
    • DName::operator+.LIBCMT ref: 01119045
    • DName::operator+.LIBCMT ref: 01119171
    • DName::operator=.LIBVCRUNTIME ref: 011191B1
    • DName::DName.LIBVCRUNTIME ref: 011191BB
    • DName::operator+.LIBCMT ref: 011191D8
    • DName::operator+.LIBCMT ref: 011191E4
      • Part of subcall function 0111A6FE: Replicator::operator[].LIBCMT ref: 0111A73B
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]shared_ptr
    • String ID:
    • API String ID: 1043660730-0
    • Opcode ID: c32928085734ce20ffc1d968b64db7cd9dc1b840ef206d2b3901883005aed917
    • Instruction ID: 03331d11a65b4e14f07b333e09f584a6272ee605abe33ad1d0aa95887ee88f48
    • Opcode Fuzzy Hash: c32928085734ce20ffc1d968b64db7cd9dc1b840ef206d2b3901883005aed917
    • Instruction Fuzzy Hash: 33C1F4B19002199FDB2CDFA8C868BEEFBF8AF19708F04447DE555A7284EB759584CB40
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: __aulldiv
    • String ID: :$f$f$f$p$p$p
    • API String ID: 3732870572-1434680307
    • Opcode ID: 955540331c9ed18d307cf044e9781ad1c0a05ff00e52a9f63dc6ddd8dec2893f
    • Instruction ID: 4b8f356610300c63efa95dea1f233e6349f65203c30b0c09b6475a1745752bb4
    • Opcode Fuzzy Hash: 955540331c9ed18d307cf044e9781ad1c0a05ff00e52a9f63dc6ddd8dec2893f
    • Instruction Fuzzy Hash: 7502AF39900119DBDB2C8FA4E4586EDBBB3FF81B25FA8451AD595FB288D3308D84CB11
    APIs
    • Replicator::operator[].LIBCMT ref: 0111A73B
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Replicator::operator[]
    • String ID: @
    • API String ID: 3676697650-2766056989
    • Opcode ID: 625b3e132dc4a323d78d32c5247ad11d1233f7852118377bba707237bd71f4d5
    • Instruction ID: 292e424ebfa2294c43daf2d8425629a9c58f04da2da718e3cd7e70adcce277aa
    • Opcode Fuzzy Hash: 625b3e132dc4a323d78d32c5247ad11d1233f7852118377bba707237bd71f4d5
    • Instruction Fuzzy Hash: 1561E371D012599FDB1CDFA8E850BEEFFB8AF18714F00403ADA51A3298EB759945CB90
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: _strrchr
    • String ID:
    • API String ID: 3213747228-0
    • Opcode ID: 8aec6c5df48ba320977836bb13f7074ec09afc02cd7a1e3d5dd1fff37ea8d533
    • Instruction ID: 7d254473a6738c2b5786cd585e45beb1fb5ea77135793b29cba21b3160a3c55c
    • Opcode Fuzzy Hash: 8aec6c5df48ba320977836bb13f7074ec09afc02cd7a1e3d5dd1fff37ea8d533
    • Instruction Fuzzy Hash: 93B19A72A04366DFEB19CF28CC81BAE7FA5EF15B14F184165E900AF682D3709901C7A1
    APIs
    • type_info::operator==.LIBVCRUNTIME ref: 0111C3F1
    • ___TypeMatch.LIBVCRUNTIME ref: 0111C4FF
    • CallUnexpected.LIBVCRUNTIME ref: 0111C66C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: CallMatchTypeUnexpectedtype_info::operator==
    • String ID: csm$csm$csm
    • API String ID: 1206542248-393685449
    • Opcode ID: d7bf862dec0d075490bdaf822c65df364787b4284955776f420cd726878cf5fb
    • Instruction ID: 3fee268538fbd18d5b337ff3794b2352a9b4bed7108acfa463097af62b6d102b
    • Opcode Fuzzy Hash: d7bf862dec0d075490bdaf822c65df364787b4284955776f420cd726878cf5fb
    • Instruction Fuzzy Hash: 24B15C7198020ADFCF1DDFA8C840AAEFBB5BF54314B044579E8156B21AD335EA61CBD1
    APIs
    • DName::operator+.LIBCMT ref: 01115DF1
    • DName::operator+.LIBCMT ref: 01115E44
      • Part of subcall function 0111489A: shared_ptr.LIBCMT ref: 011148B6
      • Part of subcall function 01114789: DName::operator+.LIBCMT ref: 011147AA
    • DName::operator+.LIBCMT ref: 01115E35
    • DName::operator+.LIBCMT ref: 01115E95
    • DName::operator+.LIBCMT ref: 01115EA2
    • DName::operator+.LIBCMT ref: 01115EE9
    • DName::operator+.LIBCMT ref: 01115EF6
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name::operator+$shared_ptr
    • String ID:
    • API String ID: 1037112749-0
    • Opcode ID: 0ba86b6190891ac7a1d3ef6a02fbf353ce2074e1c9579deac9d553e5e23c29e3
    • Instruction ID: 4ea1e6e8713c25c35a372f4464f5542e78068b64475e252e0e5398bbe25c3667
    • Opcode Fuzzy Hash: 0ba86b6190891ac7a1d3ef6a02fbf353ce2074e1c9579deac9d553e5e23c29e3
    • Instruction Fuzzy Hash: 585182B1D01219AFDF1DDFD4C844EEEFBB9AF59704F04806AE506A7184EB709644CBA1
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 14e4f1f5597a88cfae75fb7ac50e3bddeca188d93d588ef4c4e3b46616a9f893
    • Instruction ID: 2df18dd3ad21107a032d56a4245602bb6a3d30f282bfa36fa28b15c6b9f29b4b
    • Opcode Fuzzy Hash: 14e4f1f5597a88cfae75fb7ac50e3bddeca188d93d588ef4c4e3b46616a9f893
    • Instruction Fuzzy Hash: 88B1FF71A14609EFDF5E8F98D880BAE7FB1BF55388F044168E9319B281C7709942CB61
    APIs
    • DName::operator+.LIBCMT ref: 0111A5EE
    • DName::operator+.LIBCMT ref: 0111A5FA
      • Part of subcall function 0111489A: shared_ptr.LIBCMT ref: 011148B6
    • DName::operator+=.LIBCMT ref: 0111A6B8
      • Part of subcall function 01118E3C: DName::operator+.LIBCMT ref: 01118EA7
      • Part of subcall function 01118E3C: DName::operator+.LIBCMT ref: 01119171
      • Part of subcall function 01114789: DName::operator+.LIBCMT ref: 011147AA
    • DName::operator+.LIBCMT ref: 0111A675
      • Part of subcall function 011148F2: DName::operator=.LIBVCRUNTIME ref: 01114913
    • DName::DName.LIBVCRUNTIME ref: 0111A6DC
    • DName::operator+.LIBCMT ref: 0111A6E8
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name::operator+$NameName::Name::operator+=Name::operator=shared_ptr
    • String ID:
    • API String ID: 2795783184-0
    • Opcode ID: 205c3273e956667560d308562f5350f141f6cf296b1ca38c6528902fa191cc04
    • Instruction ID: 5a5d3b8e2bcae6770517e59583745f3b0f0cff389ded5b56c79a2af316dd72b4
    • Opcode Fuzzy Hash: 205c3273e956667560d308562f5350f141f6cf296b1ca38c6528902fa191cc04
    • Instruction Fuzzy Hash: AB413CB0A012949FDB1DDFA8D864B9EFFF8AF59700F404478D19597288E7355980CB90
    APIs
      • Part of subcall function 0111A6FE: Replicator::operator[].LIBCMT ref: 0111A73B
    • DName::operator=.LIBVCRUNTIME ref: 011192A6
      • Part of subcall function 01118E3C: DName::operator+.LIBCMT ref: 01118EA7
      • Part of subcall function 01118E3C: DName::operator+.LIBCMT ref: 01119171
    • DName::operator+.LIBCMT ref: 01119260
    • DName::operator+.LIBCMT ref: 0111926C
    • DName::DName.LIBVCRUNTIME ref: 011192B0
    • DName::operator+.LIBCMT ref: 011192CD
    • DName::operator+.LIBCMT ref: 011192D9
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name::operator+$NameName::Name::operator=Replicator::operator[]
    • String ID:
    • API String ID: 955152517-0
    • Opcode ID: 2a8a4774b9a1a34b395d2ba08d6890ca99d681b5e365aae051bc3c75453c40bb
    • Instruction ID: 9068accd626220a2ea25f47c234678b34ea02652da8c444db1c9263e3f6e1e60
    • Opcode Fuzzy Hash: 2a8a4774b9a1a34b395d2ba08d6890ca99d681b5e365aae051bc3c75453c40bb
    • Instruction Fuzzy Hash: 9B31E4B1A002189FCB1CDFA8C464AEEFFF8AFA9704F00842DE5A6A7754E7749544CB50
    APIs
    • GetLastError.KERNEL32(?,?,01113627,0111223A,01111CF0), ref: 0111AF20
    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0111AF2E
    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0111AF47
    • SetLastError.KERNEL32(00000000,?,01113627,0111223A,01111CF0), ref: 0111AF99
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ErrorLastValue___vcrt_
    • String ID:
    • API String ID: 3852720340-0
    • Opcode ID: 8170b893a8ce8c3a6ff4f87e34f2a96ec8e61b26581b410bec8e93bce5692aad
    • Instruction ID: 2f3e61eb4305a12fb33b2a0a32c3991d999236dac2d46bbf88dd36a6ced1c92e
    • Opcode Fuzzy Hash: 8170b893a8ce8c3a6ff4f87e34f2a96ec8e61b26581b410bec8e93bce5692aad
    • Instruction Fuzzy Hash: 4601F57210E313AEAB3E25BD7C8462FAF54DF16178720033AF525861ECEF1308854786
    Strings
    • C:\Users\user\Desktop\Loader.exe, xrefs: 0113F170
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID:
    • String ID: C:\Users\user\Desktop\Loader.exe
    • API String ID: 0-3241315448
    • Opcode ID: 83993110f45ce35c25e49c6e770889f7e57b94c7634cc35e437837fe748c1974
    • Instruction ID: c6397a8fc02d7393fb555d82958df96fd7aaac6c858c0d44d2b78cf7a951af0d
    • Opcode Fuzzy Hash: 83993110f45ce35c25e49c6e770889f7e57b94c7634cc35e437837fe748c1974
    • Instruction Fuzzy Hash: C721C639A00207EFDF2DAFB5EC8096B7769AFD12A87014524F829D7159D731EC4287A2
    APIs
    • GetConsoleOutputCP.KERNEL32(0116C080,00000000,00000000,?), ref: 01149BCB
      • Part of subcall function 01140345: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,01142B0D,00000000,0114A5BA,?,00000000,?,?,?,0114A290,0000FDE9,00000000,?), ref: 011403A6
    • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 01149E1D
    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 01149E63
    • GetLastError.KERNEL32 ref: 01149F06
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
    • String ID:
    • API String ID: 2112829910-0
    • Opcode ID: d2e08fda68f2e5db65e86cb8e28779422b4afedc8622c023b53d9309472e3b81
    • Instruction ID: 8f37395abbdbae9829bbfbb48cd646a6b30588e0ca31e01d06397c5583590727
    • Opcode Fuzzy Hash: d2e08fda68f2e5db65e86cb8e28779422b4afedc8622c023b53d9309472e3b81
    • Instruction Fuzzy Hash: 43D1ACB5D042589FCF19CFA8D8809EEBBB4EF49718F28412AE566EB351D730A941CB50
    APIs
    • __EH_prolog3.LIBCMT ref: 01116E91
    • UnDecorator::getSymbolName.LIBCMT ref: 01116F23
    • DName::operator+.LIBCMT ref: 01117027
    • DName::DName.LIBVCRUNTIME ref: 011170CA
      • Part of subcall function 0111489A: shared_ptr.LIBCMT ref: 011148B6
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name$Decorator::getH_prolog3Name::Name::operator+Symbolshared_ptr
    • String ID:
    • API String ID: 334624791-0
    • Opcode ID: 791f9a6ed2ec0a7b41528ba277667f552f126e585c38ac078f9b56eaf75978c8
    • Instruction ID: bd1a2884767a8d6dbd9c1b351fba162dcf39ee4e12b27fa816737dd24343ed9a
    • Opcode Fuzzy Hash: 791f9a6ed2ec0a7b41528ba277667f552f126e585c38ac078f9b56eaf75978c8
    • Instruction Fuzzy Hash: CA71AE76D0431A8FEB1DCF98C490BEEFBB4AB09710F04407AD951A7399D7729940CBA1
    APIs
    • DName::operator+.LIBCMT ref: 0111764D
      • Part of subcall function 011144E9: __aulldvrm.LIBCMT ref: 0111451A
    • DName::operator+.LIBCMT ref: 011175AE
    • DName::operator=.LIBVCRUNTIME ref: 01117692
    • DName::DName.LIBVCRUNTIME ref: 011176C4
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name::operator+$NameName::Name::operator=__aulldvrm
    • String ID:
    • API String ID: 2973644308-0
    • Opcode ID: 975dca9229db041ef07abd690eb04ac315c1081fb322a0660b15d99f26777a19
    • Instruction ID: 2510cf98e3dca4450536f7b6ac3c41b290cb72adbd637dc03e4e278061a23b91
    • Opcode Fuzzy Hash: 975dca9229db041ef07abd690eb04ac315c1081fb322a0660b15d99f26777a19
    • Instruction Fuzzy Hash: CD618D74900229DFEB1DDF58C890AADFBB4BB19700F05847AD9516B398E7B19A80CFD1
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: AdjustPointer
    • String ID:
    • API String ID: 1740715915-0
    • Opcode ID: 278cd1c04bdf31a30720709e9bcd632273908e44bfa06c9314e4b32c969fbdc8
    • Instruction ID: 9a2b624b742923e1e781ac0527276e3ec93c72d6e83b74063564c1c419e46a14
    • Opcode Fuzzy Hash: 278cd1c04bdf31a30720709e9bcd632273908e44bfa06c9314e4b32c969fbdc8
    • Instruction Fuzzy Hash: DB51CE76680702EFEB2D9F58D840BAAFBA4EF00614F14413DDD0197298EB31E890CBD1
    APIs
    • DName::operator+.LIBCMT ref: 0111727D
      • Part of subcall function 0111485E: DName::operator+=.LIBCMT ref: 01114874
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: Name::operator+Name::operator+=
    • String ID:
    • API String ID: 382699925-0
    • Opcode ID: 718db1dbddd22fcfbb37919d224c40634a30832eadf21bdfe78493581b4a8067
    • Instruction ID: 3f670f45bab9c4f7c577721a5645e2616468d34b1449b7f66d63f77019c48628
    • Opcode Fuzzy Hash: 718db1dbddd22fcfbb37919d224c40634a30832eadf21bdfe78493581b4a8067
    • Instruction Fuzzy Hash: 7C415A71D0421ADBDB0DDFA8C585AEEFFB4EB08314F10402AE915B7388DB759685CBA1
    APIs
      • Part of subcall function 01140345: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,01142B0D,00000000,0114A5BA,?,00000000,?,?,?,0114A290,0000FDE9,00000000,?), ref: 011403A6
    • GetLastError.KERNEL32 ref: 0113E0DD
    • __dosmaperr.LIBCMT ref: 0113E0E4
    • GetLastError.KERNEL32(?,?,?,?), ref: 0113E11E
    • __dosmaperr.LIBCMT ref: 0113E125
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
    • String ID:
    • API String ID: 1913693674-0
    • Opcode ID: 1b04137277e1a992e2d7252555c6ac2ce5621e4493cdcb9796b2b78e4f6fcb46
    • Instruction ID: 7a1816850b3e8db8689c7ccf322de50bc2ec4edef249f74bed91eb397f286625
    • Opcode Fuzzy Hash: 1b04137277e1a992e2d7252555c6ac2ce5621e4493cdcb9796b2b78e4f6fcb46
    • Instruction Fuzzy Hash: F621D771601716EFDF29AFB9D88086FBBA9FF943687008528F829D7144D731EC4187A1
    APIs
    • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,0116C080,?,01141518,01156234,0113DE60,00000000,?), ref: 011414CA
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: FreeLibrary
    • String ID:
    • API String ID: 3664257935-0
    • Opcode ID: e9f3a0578057046da4e7590d033f4102f9f7e115d38211eaf89607671b4322aa
    • Instruction ID: eb00da04b10a436ed2aab441be8f14fee324355dd07ced10cbf417591a11ffea
    • Opcode Fuzzy Hash: e9f3a0578057046da4e7590d033f4102f9f7e115d38211eaf89607671b4322aa
    • Instruction Fuzzy Hash: 0F212B71A01311FBDB3D9A65EC44A5A7758AF41BB0F2D0221ED15AB2C5D730F981C7E0
    APIs
    • GetEnvironmentStringsW.KERNEL32 ref: 01140454
      • Part of subcall function 01140345: WideCharToMultiByte.KERNEL32(?,00000000,00000000,?,01142B0D,00000000,0114A5BA,?,00000000,?,?,?,0114A290,0000FDE9,00000000,?), ref: 011403A6
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0114048C
    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 011404AC
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: EnvironmentStrings$Free$ByteCharMultiWide
    • String ID:
    • API String ID: 158306478-0
    • Opcode ID: afca1aeb8be13845c90bcf39e3cf739aa7899c77d728dfda0371f7989094fac7
    • Instruction ID: a8481ac9026af399febeef9117d80c4067a0715637b6f7dc6573d685631c800e
    • Opcode Fuzzy Hash: afca1aeb8be13845c90bcf39e3cf739aa7899c77d728dfda0371f7989094fac7
    • Instruction Fuzzy Hash: F61104F1905217BFAB2E27F66C88CEF295CCF998E87550024FA19E1100FB20CD4282B2
    APIs
    • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?), ref: 01152A8E
    • GetLastError.KERNEL32(?,?,?,?), ref: 01152A9B
    • SetFilePointerEx.KERNEL32(?,?,?,?,?), ref: 01152AC1
    • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 01152AE7
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: FilePointer$ErrorLast
    • String ID:
    • API String ID: 142388799-0
    • Opcode ID: 37c0dec2a02b9e1b50beef4e87ffddbc4953a8c01af6971f662700600d4203a4
    • Instruction ID: 6502b5054b9608ca8d505a8886ce1e1ae9b255d3b42692f779e60d6e4607f646
    • Opcode Fuzzy Hash: 37c0dec2a02b9e1b50beef4e87ffddbc4953a8c01af6971f662700600d4203a4
    • Instruction Fuzzy Hash: 8A113376900219EFDF289EA5E848D9F3F79EB043A0F004554B824A61A0CB718A80DBA1
    APIs
    • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 01156A46
    • GetLastError.KERNEL32 ref: 01156A52
      • Part of subcall function 01156AFB: CloseHandle.KERNEL32(0116C980,01156B45,?,01152DAE,00000000,00000001,00000000,?,?,01149F5A,?,00000000,00000000,?,?), ref: 01156B0B
    • ___initconout.LIBCMT ref: 01156A62
      • Part of subcall function 01156ABD: CreateFileW.KERNEL32(01168E84,40000000,00000003,00000000,00000003,00000000,00000000,01156AEC,01152D9B,?,?,01149F5A,?,00000000,00000000,?), ref: 01156AD0
    • WriteConsoleW.KERNEL32(?,?,?,00000000), ref: 01156A76
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
    • String ID:
    • API String ID: 2744216297-0
    • Opcode ID: e1831ff242182c5ccba4c4de81cd57e62c47da0c2d1dd165b8dfa5d48cd2e138
    • Instruction ID: 52b17fa1f82e73cdd884b6ac989ed87c20bd7087d31eb6e4c5acbe0a7779c40f
    • Opcode Fuzzy Hash: e1831ff242182c5ccba4c4de81cd57e62c47da0c2d1dd165b8dfa5d48cd2e138
    • Instruction Fuzzy Hash: CCF0FE3A101641FBCB7A1BE6EC08D46BBB6EB887617558425F9B982120DB3294A0DB91
    APIs
    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,01152DAE,00000000,00000001,00000000,?,?,01149F5A,?,00000000,00000000), ref: 01156B29
    • GetLastError.KERNEL32(?,01152DAE,00000000,00000001,00000000,?,?,01149F5A,?,00000000,00000000,?,?,?,0114A545,00000000), ref: 01156B35
      • Part of subcall function 01156AFB: CloseHandle.KERNEL32(0116C980,01156B45,?,01152DAE,00000000,00000001,00000000,?,?,01149F5A,?,00000000,00000000,?,?), ref: 01156B0B
    • ___initconout.LIBCMT ref: 01156B45
      • Part of subcall function 01156ABD: CreateFileW.KERNEL32(01168E84,40000000,00000003,00000000,00000003,00000000,00000000,01156AEC,01152D9B,?,?,01149F5A,?,00000000,00000000,?), ref: 01156AD0
    • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,01152DAE,00000000,00000001,00000000,?,?,01149F5A,?,00000000,00000000,?), ref: 01156B5A
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
    • String ID:
    • API String ID: 2744216297-0
    • Opcode ID: aabf76f828531f8abdb946359f567f52bbeb8979450b3f6d4d8b73c84167e0f4
    • Instruction ID: e4519f3fc52b31f2588114f0155ebfec3a215fcad889154aa1f551f0d4530cd7
    • Opcode Fuzzy Hash: aabf76f828531f8abdb946359f567f52bbeb8979450b3f6d4d8b73c84167e0f4
    • Instruction Fuzzy Hash: 40F0C736501255FBCF761FE5EC0899A7F25FB083B1B454424FD3895124D73288A0DBD5
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: __aulldiv
    • String ID: +$-
    • API String ID: 3732870572-2137968064
    • Opcode ID: 8271c02f295ee639f723ab7f401718d96e610fcdba1de5e3f424324952d9fd94
    • Instruction ID: c3070195b3eaf084a6cba20270c35b665cc03170d7a902eb97c00e4b37467b19
    • Opcode Fuzzy Hash: 8271c02f295ee639f723ab7f401718d96e610fcdba1de5e3f424324952d9fd94
    • Instruction Fuzzy Hash: BCA1E5709402499FDF2DCF3898906EE7FB5AFC6224F048559E8E6DB289D335D9018B51
    APIs
    • RtlEncodePointer.NTDLL(00000000), ref: 0111C69C
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: EncodePointer
    • String ID: MOC$RCC
    • API String ID: 2118026453-2084237596
    • Opcode ID: 86252ce723843a7d169b00fd1c0520c5396cc4aa19a59093a294a35be3cf89e2
    • Instruction ID: e3c810aa1e202b49bf566036ccff923e0a291cab434c1c96df84dabbdad883fb
    • Opcode Fuzzy Hash: 86252ce723843a7d169b00fd1c0520c5396cc4aa19a59093a294a35be3cf89e2
    • Instruction Fuzzy Hash: DB416C7190010AEFDF1ACF98CD80AEEBBB5BF48304F184069FA04A7255D375A950DF91
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: NameName::
    • String ID: A
    • API String ID: 1333004437-3554254475
    • Opcode ID: b5d48850f0803a66965e1788db75ccbab3b96ab3556d1ff85075a1e2befb681c
    • Instruction ID: 44254827144ab5fb0d9f1470fc9c332a0cda584d1e8ee57db2d2b842c332d3ee
    • Opcode Fuzzy Hash: b5d48850f0803a66965e1788db75ccbab3b96ab3556d1ff85075a1e2befb681c
    • Instruction Fuzzy Hash: 2F21DE30A0020AAFCF1DDF98D810BACBFB1FB18704F048079E4555B399D7319681CB81
    APIs
    • ___swprintf_l.LIBCMT ref: 01114232
      • Part of subcall function 0111AD33: _vsnprintf.LEGACY_STDIO_DEFINITIONS ref: 0111AD43
    • swprintf.LIBCMT ref: 01114255
      • Part of subcall function 0111AD4D: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0111AD5F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ___swprintf_l__vswprintf_c_l_vsnprintfswprintf
    • String ID: %lf
    • API String ID: 3672277462-2891890143
    • Opcode ID: 1fc18bce24cd6c2ff2ec910c7f9d8d5ddfbbd044e2937ec9c8c7349c41caa020
    • Instruction ID: 5b5c0c2af3210e4905b513aea9852f35f06778e590eca7564b9714b2315d21b8
    • Opcode Fuzzy Hash: 1fc18bce24cd6c2ff2ec910c7f9d8d5ddfbbd044e2937ec9c8c7349c41caa020
    • Instruction Fuzzy Hash: C9F0C2A1500009BBDB096B84DC45FBFBE6CDF95264F014098F68527240DB315E1093B1
    APIs
    • ___swprintf_l.LIBCMT ref: 0111428E
      • Part of subcall function 0111AD33: _vsnprintf.LEGACY_STDIO_DEFINITIONS ref: 0111AD43
    • swprintf.LIBCMT ref: 011142B1
      • Part of subcall function 0111AD4D: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0111AD5F
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4141687608.0000000001111000.00000020.00001000.00020000.00000000.sdmp, Offset: 01111000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_1111000_Loader.jbxd
    Similarity
    • API ID: ___swprintf_l__vswprintf_c_l_vsnprintfswprintf
    • String ID: %lf
    • API String ID: 3672277462-2891890143
    • Opcode ID: 9fcb8c2445ba46c5901102a2cdc55d4b0acafc36fbe042b9c0fed95ced912c00
    • Instruction ID: 958e4c8301aae8640371795c6f972890cdd42a4f80ff96d0996d63705be0ffa2
    • Opcode Fuzzy Hash: 9fcb8c2445ba46c5901102a2cdc55d4b0acafc36fbe042b9c0fed95ced912c00
    • Instruction Fuzzy Hash: 54F0B4A210400DBBDB096B54DC85FBFBF6CDF992A8F018059FA451B280DB359E15D3B5