Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1iC0WTxgUf.exe

Overview

General Information

Sample name:1iC0WTxgUf.exe
renamed because original name is a hash value
Original sample name:530c28302405edb307c3c0e49c2bd5a7.exe
Analysis ID:1576508
MD5:530c28302405edb307c3c0e49c2bd5a7
SHA1:8f3a2ced532a64e728ab74762785702e1e2a0f42
SHA256:efeb8d13efff6fa8be497988a973920dc1ee48e134eed363a1924ecc82973976
Tags:exeuser-abuse_ch
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Abnormal high CPU Usage
Connects to a URL shortener service
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Found evaded block containing many API calls
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 1iC0WTxgUf.exe (PID: 1484 cmdline: "C:\Users\user\Desktop\1iC0WTxgUf.exe" MD5: 530C28302405EDB307C3C0E49C2BD5A7)
    • 1iC0WTxgUf.exe (PID: 3892 cmdline: C:\Users\user\Desktop\1iC0WTxgUf.exe MD5: 795C7666E4950615A6BD5BCA64FF7135)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
2024-12-17T08:15:15.348358+010028032702Potentially Bad Traffic192.168.2.849704172.232.31.180443TCP
2024-12-17T08:15:20.799692+010028032702Potentially Bad Traffic192.168.2.849707172.67.193.8480TCP

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 1iC0WTxgUf.exeAvira: detected
Source: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142RMAvira URL Cloud: Label: malware
Source: http://ww1.cutit.org/Avira URL Cloud: Label: malware
Source: http://ww1.cutit.org/oxgBR?usid=26&utid=95814961422Avira URL Cloud: Label: malware
Source: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142D0ytAvira URL Cloud: Label: malware
Source: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142E1Avira URL Cloud: Label: malware
Source: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142Y1Avira URL Cloud: Label: malware
Source: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142Avira URL Cloud: Label: malware
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeAvira: detection malicious, Label: TR/Crypt.ULPM.Gen
Source: 1iC0WTxgUf.exeReversingLabs: Detection: 84%
Source: 1iC0WTxgUf.exeVirustotal: Detection: 80%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeJoe Sandbox ML: detected
Source: 1iC0WTxgUf.exeJoe Sandbox ML: detected
Source: 1iC0WTxgUf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: unknownHTTPS traffic detected: 172.232.31.180:443 -> 192.168.2.8:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.18.0.75:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040CBD0 FindFirstFileA,FindClose,0_2_0040CBD0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9BFD0 FindFirstFileA,FindClose,0_2_01F9BFD0
Source: unknownDNS query: name: q.gs
Source: Joe Sandbox ViewIP Address: 64.190.63.136 64.190.63.136
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49707 -> 172.67.193.84:80
Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.8:49704 -> 172.232.31.180:443
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Host: cutit.orgCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /adfly-hard-migrator/url?url=http://q.gs/EVnYC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Cache-Control: no-cacheHost: publisher.linkvertise.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Cache-Control: no-cacheHost: ww99.cutit.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR?usid=26&utid=9581496142 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Cache-Control: no-cacheConnection: Keep-AliveHost: ww1.cutit.org
Source: global trafficHTTP traffic detected: GET /EVnYC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Host: q.gsCache-Control: no-cache
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040D740 InternetOpenA,InternetOpenUrlA,InternetReadFile,InternetCloseHandle,InternetCloseHandle,0_2_0040D740
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Host: cutit.orgCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /adfly-hard-migrator/url?url=http://q.gs/EVnYC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Cache-Control: no-cacheHost: publisher.linkvertise.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Cache-Control: no-cacheHost: ww99.cutit.orgConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /oxgBR?usid=26&utid=9581496142 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Cache-Control: no-cacheConnection: Keep-AliveHost: ww1.cutit.org
Source: global trafficHTTP traffic detected: GET /EVnYC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0Host: q.gsCache-Control: no-cache
Source: global trafficDNS traffic detected: DNS query: cutit.org
Source: global trafficDNS traffic detected: DNS query: ww99.cutit.org
Source: global trafficDNS traffic detected: DNS query: ww1.cutit.org
Source: global trafficDNS traffic detected: DNS query: q.gs
Source: global trafficDNS traffic detected: DNS query: publisher.linkvertise.com
Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Tue, 17 Dec 2024 07:15:22 GMTContent-Type: text/html; charset=UTF-8Content-Length: 4517Connection: closeReferrer-Policy: same-originCache-Control: max-age=15Expires: Tue, 17 Dec 2024 07:15:37 GMTSet-Cookie: __cf_bm=j2wv9VHDMaWOcu0prtp_ZXuDURHG.2tm3enKSi30rAE-1734419722-1.0.1.1-HPihD2McldE6XnQAZ2UX9zY93rWTWZVDpkpTuWBj1zBP.mb_RLGMDoJChNzzn21ax_aCbWOk56GbtCCEFznXIA; path=/; expires=Tue, 17-Dec-24 07:45:22 GMT; domain=.linkvertise.com; HttpOnly; Secure; SameSite=NoneX-Frame-Options: sameoriginServer: cloudflareCF-RAY: 8f351f220d5f8c05-EWRalt-svc: h3=":443"; ma=86400
Source: global trafficHTTP traffic detected: HTTP/1.1 403 Forbiddencontent-length: 93cache-control: no-cachecontent-type: text/htmlData Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 52 65 71 75 65 73 74 20 66 6f 72 62 69 64 64 65 6e 20 62 79 20 61 64 6d 69 6e 69 73 74 72 61 74 69 76 65 20 72 75 6c 65 73 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <html><body><h1>403 Forbidden</h1>Request forbidden by administrative rules.</body></html>
Source: 1iC0WTxgUf.exe, 1iC0WTxgUf.exe, 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, 1iC0WTxgUf.exe, 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: http://cli.re/gzBM75
Source: 1iC0WTxgUf.exe, 1iC0WTxgUf.exe, 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, 1iC0WTxgUf.exe, 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpString found in binary or memory: http://q.gs/EVnYC
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538379901.0000000000CA5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/oxgBR?usid=26&utid=95814961422
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142D0yt
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142E1
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142RM
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142Y1
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.cutit.org/oxgBR
Source: 1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.cutit.org/oxgBRU
Source: 1iC0WTxgUf.exe, 1iC0WTxgUf.exe, 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, 1iC0WTxgUf.exe, 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmp, 1iC0WTxgUf.exe, 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmp, 1iC0WTxgUf.exe, 00000002.00000003.1538379901.0000000000CA5000.00000004.00000020.00020000.00000000.sdmp, 1iC0WTxgUf.exe, 00000002.00000003.1538349427.0000000001FF7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cutit.org/oxgBR
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 172.232.31.180:443 -> 192.168.2.8:49704 version: TLS 1.2
Source: unknownHTTPS traffic detected: 104.18.0.75:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0043E3300_2_0043E330
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_00406AB00_2_00406AB0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0043CD7F0_2_0043CD7F
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0045CED00_2_0045CED0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_004037600_2_00403760
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_004038400_2_00403840
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0041F8C00_2_0041F8C0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0041F9A00_2_0041F9A0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_00425A400_2_00425A40
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01FE60D00_2_01FE60D0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01FA8BA00_2_01FA8BA0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F92B600_2_01F92B60
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01FA8AC00_2_01FA8AC0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F92C400_2_01F92C40
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01FAEC400_2_01FAEC40
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01FC75300_2_01FC7530
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01FC5F7F0_2_01FC5F7F
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F95EB00_2_01F95EB0
Source: 1iC0WTxgUf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: classification engineClassification label: mal84.winEXE@3/3@7/5
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B140 FindResourceA,0_2_0040B140
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeFile created: C:\Users\user\Desktop\1iC0WTxgUf.exeJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 1iC0WTxgUf.exeReversingLabs: Detection: 84%
Source: 1iC0WTxgUf.exeVirustotal: Detection: 80%
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeFile read: C:\Users\user\Desktop\old_1iC0WTxgUf.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\1iC0WTxgUf.exe "C:\Users\user\Desktop\1iC0WTxgUf.exe"
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeProcess created: C:\Users\user\Desktop\1iC0WTxgUf.exe C:\Users\user\Desktop\1iC0WTxgUf.exe
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeProcess created: C:\Users\user\Desktop\1iC0WTxgUf.exe C:\Users\user\Desktop\1iC0WTxgUf.exeJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: 1iC0WTxgUf.exeStatic file information: File size 2892482 > 1048576
Source: 1iC0WTxgUf.exeStatic PE information: Raw size of UPX1 is bigger than: 0x100000 < 0x259e00
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0042A4BF push C900000Ah; ret 0_2_0042A4C9
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B2D1 push eax; ret 0_2_0040B2D3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B361 push eax; ret 0_2_0040B363
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B301 push eax; ret 0_2_0040B303
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B331 push eax; ret 0_2_0040B333
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B3E1 push eax; ret 0_2_0040B3E3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B381 push eax; ret 0_2_0040B383
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B3B1 push eax; ret 0_2_0040B3B3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B441 push eax; ret 0_2_0040B443
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B471 push eax; ret 0_2_0040B473
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B411 push eax; ret 0_2_0040B413
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B4D1 push eax; ret 0_2_0040B4D3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B4A1 push eax; ret 0_2_0040B4A3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B501 push eax; ret 0_2_0040B503
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A7E1 push eax; ret 0_2_01F9A7E3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A7B1 push eax; ret 0_2_01F9A7B3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A781 push eax; ret 0_2_01F9A783
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A761 push eax; ret 0_2_01F9A763
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A731 push eax; ret 0_2_01F9A733
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A701 push eax; ret 0_2_01F9A703
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A6D1 push eax; ret 0_2_01F9A6D3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A901 push eax; ret 0_2_01F9A903
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A8D1 push eax; ret 0_2_01F9A8D3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A8A1 push eax; ret 0_2_01F9A8A3
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A871 push eax; ret 0_2_01F9A873
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A841 push eax; ret 0_2_01F9A843
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A811 push eax; ret 0_2_01F9A813
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01FB36BF push C900000Ah; ret 0_2_01FB36C9
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: initial sampleStatic PE information: section name: UPX0
Source: initial sampleStatic PE information: section name: UPX1
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeFile created: C:\Users\user\Desktop\1iC0WTxgUf.exeJump to dropped file
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeFile created: C:\Users\user\Desktop\old_1iC0WTxgUf.exe (copy)Jump to dropped file
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeEvaded block: after key decisiongraph_0-126926
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeAPI coverage: 8.7 %
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040CBD0 FindFirstFileA,FindClose,0_2_0040CBD0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9BFD0 FindFirstFileA,FindClose,0_2_01F9BFD0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040B5F0 mov eax, dword ptr fs:[00000030h]0_2_0040B5F0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A9F0 mov eax, dword ptr fs:[00000030h]0_2_01F9A9F0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_00407340 GetProcessHeap,HeapAlloc,RtlAllocateHeap,0_2_00407340
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040AF90 SetUnhandledExceptionFilter,0_2_0040AF90
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0040AFA0 SetUnhandledExceptionFilter,0_2_0040AFA0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A3A0 SetUnhandledExceptionFilter,0_2_01F9A3A0
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_01F9A390 SetUnhandledExceptionFilter,0_2_01F9A390
Source: C:\Users\user\Desktop\1iC0WTxgUf.exeCode function: 0_2_0041AD00 cpuid 0_2_0041AD00
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure1
Spearphishing Link
1
Native API
1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Query Registry
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Security Software Discovery
Remote Desktop ProtocolData from Removable Media4
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
Obfuscated Files or Information
Security Account Manager1
File and Directory Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Software Packing
NTDS11
System Information Discovery
Distributed Component Object ModelInput Capture14
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1iC0WTxgUf.exe84%ReversingLabsWin32.Infostealer.Tinba
1iC0WTxgUf.exe80%VirustotalBrowse
1iC0WTxgUf.exe100%AviraTR/Crypt.ULPM.Gen
1iC0WTxgUf.exe100%Joe Sandbox ML
SourceDetectionScannerLabelLink
C:\Users\user\Desktop\1iC0WTxgUf.exe100%AviraTR/Crypt.ULPM.Gen
C:\Users\user\Desktop\1iC0WTxgUf.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142RM100%Avira URL Cloudmalware
http://ww99.cutit.org/oxgBR0%Avira URL Cloudsafe
http://ww1.cutit.org/100%Avira URL Cloudmalware
http://ww1.cutit.org/oxgBR?usid=26&utid=95814961422100%Avira URL Cloudmalware
http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142D0yt100%Avira URL Cloudmalware
http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142E1100%Avira URL Cloudmalware
http://q.gs/EVnYC0%Avira URL Cloudsafe
http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142Y1100%Avira URL Cloudmalware
http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142100%Avira URL Cloudmalware
http://ww99.cutit.org/oxgBRU0%Avira URL Cloudsafe
https://cutit.org/oxgBR0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ww99.cutit.org
69.16.230.228
truefalse
    unknown
    cutit.org
    172.232.31.180
    truefalse
      unknown
      sedoparking.com
      64.190.63.136
      truefalse
        high
        q.gs
        172.67.193.84
        truefalse
          unknown
          publisher.linkvertise.com
          104.18.0.75
          truefalse
            high
            ww1.cutit.org
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://ww99.cutit.org/oxgBRfalse
              • Avira URL Cloud: safe
              unknown
              https://publisher.linkvertise.com/adfly-hard-migrator/url?url=http://q.gs/EVnYCfalse
                high
                http://q.gs/EVnYCfalse
                • Avira URL Cloud: safe
                unknown
                https://cutit.org/oxgBRfalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://ww1.cutit.org/1iC0WTxgUf.exe, 00000002.00000003.1538379901.0000000000CA5000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142RM1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142Y11iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://cli.re/gzBM751iC0WTxgUf.exe, 1iC0WTxgUf.exe, 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, 1iC0WTxgUf.exe, 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpfalse
                  high
                  http://ww1.cutit.org/oxgBR?usid=26&utid=958149614221iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142D0yt1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142E11iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://ww1.cutit.org/oxgBR?usid=26&utid=95814961421iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://ww99.cutit.org/oxgBRU1iC0WTxgUf.exe, 00000002.00000003.1538279395.0000000000C66000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  64.190.63.136
                  sedoparking.comUnited States
                  11696NBS11696USfalse
                  172.67.193.84
                  q.gsUnited States
                  13335CLOUDFLARENETUSfalse
                  69.16.230.228
                  ww99.cutit.orgUnited States
                  32244LIQUIDWEBUSfalse
                  104.18.0.75
                  publisher.linkvertise.comUnited States
                  13335CLOUDFLARENETUSfalse
                  172.232.31.180
                  cutit.orgUnited States
                  20940AKAMAI-ASN1EUfalse
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1576508
                  Start date and time:2024-12-17 08:14:10 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 8m 24s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:1iC0WTxgUf.exe
                  renamed because original name is a hash value
                  Original Sample Name:530c28302405edb307c3c0e49c2bd5a7.exe
                  Detection:MAL
                  Classification:mal84.winEXE@3/3@7/5
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 78%
                  • Number of executed functions: 47
                  • Number of non-executed functions: 84
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  No simulations
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  64.190.63.1368dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0512-3272-9af7-07db3dd99c21
                  7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0501-483c-8aad-002891fb5a97
                  UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0450-5851-9938-0bdfa7f33a56
                  1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0450-17b0-8984-b4b272a22199
                  arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0433-44f6-9e59-dc72adbb0086
                  Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0425-1706-a2c8-02526792f211
                  WlCVLbzNph.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0426-044d-b465-1d078f2f97da
                  Bpfz752pYZ.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0413-3653-b9c7-4bbc444bdc48
                  uavINoSIQh.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0408-09d4-8f1c-1de8890559b5
                  7DAKMhINGk.exeGet hashmaliciousSimda StealerBrowse
                  • ww16.vofycot.com/login.php?sub1=20241112-0352-0187-b8de-fd2bfab34f87
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  cutit.orgSecuriteInfo.com.Trojan.GenericKDZ.98125.20009.29397.exeGet hashmaliciousUnknownBrowse
                  • 64.91.240.248
                  qrxTjrTy5j.exeGet hashmaliciousUnknownBrowse
                  • 69.16.230.42
                  VIXfePT6im.exeGet hashmaliciousUnknownBrowse
                  • 69.16.230.42
                  sedoparking.com8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  WlCVLbzNph.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  Bpfz752pYZ.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  uavINoSIQh.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  7DAKMhINGk.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  q.gsJpd99za14I.exeGet hashmaliciousUnknownBrowse
                  • 172.67.193.84
                  qrxTjrTy5j.exeGet hashmaliciousUnknownBrowse
                  • 172.67.193.84
                  VIXfePT6im.exeGet hashmaliciousUnknownBrowse
                  • 104.21.84.133
                  publisher.linkvertise.comhttps://tiny.pl/wpxvhGet hashmaliciousUnknownBrowse
                  • 172.64.164.4
                  https://tiny.pl/wpxvhGet hashmaliciousUnknownBrowse
                  • 172.64.164.4
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  NBS11696US236236236.elfGet hashmaliciousUnknownBrowse
                  • 64.190.63.222
                  https://t.co/eSJUUrWOcOGet hashmaliciousHTMLPhisherBrowse
                  • 216.198.79.1
                  Payroll List.exeGet hashmaliciousFormBookBrowse
                  • 64.190.63.222
                  PROFORMA INVOICE.exeGet hashmaliciousFormBookBrowse
                  • 64.190.63.222
                  8dPlV2lT8o.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  7ObLFE2iMK.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  UMwpXhA46R.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  1fWgBXPgiT.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  arxtPs1STE.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  Z8eHwAvqAh.exeGet hashmaliciousSimda StealerBrowse
                  • 64.190.63.136
                  CLOUDFLARENETUShttps://essind.freshdesk.com/en/support/solutions/articles/157000010576-pedido-553268637Get hashmaliciousUnknownBrowse
                  • 104.17.25.14
                  seethebestmethodwithgreatnessgoodnewsgreatdaygivenme.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                  • 104.21.84.67
                  sweetnesswithgreatnessiwthbestthingswithmebackickmegreatthings.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                  • 172.67.187.200
                  createdbetterthingswithgreatnressgivenmebackwithnice.htaGet hashmaliciousCobalt Strike, FormBookBrowse
                  • 104.21.84.67
                  ppc.elfGet hashmaliciousMirai, MoobotBrowse
                  • 172.65.156.157
                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LiteHTTP Bot, LummaC Stealer, Stealc, XmrigBrowse
                  • 104.21.2.110
                  file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, LummaC Stealer, Stealc, XmrigBrowse
                  • 172.67.129.27
                  PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                  • 188.114.97.3
                  https://tinyurl.com/5faazntxGet hashmaliciousUnknownBrowse
                  • 104.18.111.161
                  https://solve.jenj.org/awjxs.captcha?u=001e7d38-a1fc-47e3-ac88-6df0872bfe2dGet hashmaliciousUnknownBrowse
                  • 104.21.16.207
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  37f463bf4616ecd445d4a1937da06e19PURCHASE ORDER TRC-0909718-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  file.exeGet hashmaliciousScreenConnect Tool, Amadey, RHADAMANTHYS, XWorm, XmrigBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  Justificante pago-09453256434687.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  ME-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  09-FD-94.03.60.175.07.xlsx.exeGet hashmaliciousGuLoaderBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  TEC-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  ME-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  09-FD-94.03.60.175.07.xlsx.exeGet hashmaliciousGuLoaderBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  TEC-SPC-94.03.60.175.07.exeGet hashmaliciousGuLoaderBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  pedido-035241.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                  • 104.18.0.75
                  • 172.232.31.180
                  No context
                  Process:C:\Users\user\Desktop\1iC0WTxgUf.exe
                  File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                  Category:modified
                  Size (bytes):2892482
                  Entropy (8bit):5.6154927625508915
                  Encrypted:false
                  SSDEEP:49152:6Fe5stXMv1aLDtYTCqJkN9EU4YxqyW0E67iafjJay3:6G22abkUvxqyW5Na7p3
                  MD5:795C7666E4950615A6BD5BCA64FF7135
                  SHA1:0B96A24A8758339DF792E343621FAB3519576427
                  SHA-256:90567A08C18120E1007532FEC6E8D2861750F2E96A3B5E8C18ED83EA66B33C3C
                  SHA-512:F3713D6245008E588E5EB0E85B9B786A238D5D4E006A52656A27FB56171ADBD5248779F1BDB61E469DA090066511178DA10DBBAB0836F984846E965E228329AD
                  Malicious:true
                  Antivirus:
                  • Antivirus: Avira, Detection: 100%
                  • Antivirus: Joe Sandbox ML, Detection: 100%
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........................%.......p.z.....p.......@.....................................................................................@..........................................................................................................UPX0......p.............................UPX1......%...p...%.................@....rsrc....P.......B....%.............@....bss.... ........?6..M...M...M8.{M...M..SM...M..#M..XM|._M...M^..M[..M'..M...M..uMP.LM...MP.MM}..M...M..oMo..Mi.GM...M..^M..iM...M;.wM...M..WM...M;.rM..uM.."M...Ml..M..SM..FM...M...M..:M...M#..M...M...M..GM{..M...M`.0M...Mw.*M@.?M..sMR.MM...M...MR.7M...Md.`M!.]M...M...M...M..\M..~M..vM2..M..wM..|M..$M...M...M...M/.^MO./M_..Mz..M...Mv..MH.'M...M3.jM:..M...M...M...Ms..M/..Mr..M$..MC..M'.kM...M...M5..M...M...M...M..eM..%M...M%..M..:Ma.`M..AMw..M..}M...Mc..MF..M!..M...M,.0Mz..M]..M/.[M..\M<.fM'.1M...M..
                  Process:C:\Users\user\Desktop\1iC0WTxgUf.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):26
                  Entropy (8bit):3.95006375643621
                  Encrypted:false
                  SSDEEP:3:ggPYV:rPYV
                  MD5:187F488E27DB4AF347237FE461A079AD
                  SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                  SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                  SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:[ZoneTransfer]....ZoneId=0
                  Process:C:\Users\user\Desktop\1iC0WTxgUf.exe
                  File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                  Category:dropped
                  Size (bytes):2892482
                  Entropy (8bit):5.6154927625508915
                  Encrypted:false
                  SSDEEP:49152:6Fe5stXMv1aLDtYTCqJkN9EU4YxqyW0E67iafjJay3:6G22abkUvxqyW5Na7p3
                  MD5:795C7666E4950615A6BD5BCA64FF7135
                  SHA1:0B96A24A8758339DF792E343621FAB3519576427
                  SHA-256:90567A08C18120E1007532FEC6E8D2861750F2E96A3B5E8C18ED83EA66B33C3C
                  SHA-512:F3713D6245008E588E5EB0E85B9B786A238D5D4E006A52656A27FB56171ADBD5248779F1BDB61E469DA090066511178DA10DBBAB0836F984846E965E228329AD
                  Malicious:true
                  Reputation:low
                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........................%.......p.z.....p.......@.....................................................................................@..........................................................................................................UPX0......p.............................UPX1......%...p...%.................@....rsrc....P.......B....%.............@....bss.... ........?6..M...M...M8.{M...M..SM...M..#M..XM|._M...M^..M[..M'..M...M..uMP.LM...MP.MM}..M...M..oMo..Mi.GM...M..^M..iM...M;.wM...M..WM...M;.rM..uM.."M...Ml..M..SM..FM...M...M..:M...M#..M...M...M..GM{..M...M`.0M...Mw.*M@.?M..sMR.MM...M...MR.7M...Md.`M!.]M...M...M...M..\M..~M..vM2..M..wM..|M..$M...M...M...M/.^MO./M_..Mz..M...Mv..MH.'M...M3.jM:..M...M...M...Ms..M/..Mr..M$..MC..M'.kM...M...M5..M...M...M...M..eM..%M...M%..M..:Ma.`M..AMw..M..}M...Mc..MF..M!..M...M,.0Mz..M]..M/.[M..\M<.fM'.1M...M..
                  File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
                  Entropy (8bit):5.61752656620716
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.66%
                  • UPX compressed Win32 Executable (30571/9) 0.30%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • VXD Driver (31/22) 0.00%
                  File name:1iC0WTxgUf.exe
                  File size:2'892'482 bytes
                  MD5:530c28302405edb307c3c0e49c2bd5a7
                  SHA1:8f3a2ced532a64e728ab74762785702e1e2a0f42
                  SHA256:efeb8d13efff6fa8be497988a973920dc1ee48e134eed363a1924ecc82973976
                  SHA512:3dd68fd409caef4ebb65ce9302791ea23af0fb8816b7f3ab498a68964e142e54f7ddaa75a96745012ec278038be3d42865e4159bb1619e945a185a370417fa86
                  SSDEEP:49152:S+UvTnuhKL7q4sxu5vLlsA8OvzaTaAivZNrTVpOpE5XJIFay3:wvTsp4nSnaVRRXS3
                  TLSH:72D522F2949AC84FC7363F784250E435DE6480602F9E79DED68A3E155C683EF18D827A
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.........................%.......p.z.....p.......@........................................................................
                  Icon Hash:176979b232797969
                  Entrypoint:0xd68a7a
                  Entrypoint Section:UPX1
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                  DLL Characteristics:
                  Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:6ed4f5f04d62b18d96b26d6db7c18840
                  Instruction
                  mov edx, 00000000h
                  push ebx
                  or eax, esi
                  add esi, 4682C37Fh
                  pop edi
                  mov esi, eax
                  push edi
                  and esi, eax
                  sub esi, E677A4ADh
                  mov ecx, dword ptr [esp]
                  add esp, 04h
                  sub esi, B2645495h
                  and esi, esi
                  push ecx
                  mov eax, 3C5C84B6h
                  pop ebx
                  add eax, eax
                  add edx, 00000001h
                  inc esi
                  and eax, esi
                  cmp edx, 010027FDh
                  jne 00007FAD78F8A165h
                  add esi, eax
                  inc eax
                  push 00B0F000h
                  mov esi, dword ptr [esp]
                  add esp, 04h
                  mov eax, D090BDBDh
                  or ecx, ecx
                  mov edx, 00D68885h
                  or ecx, eax
                  sub eax, ecx
                  mov edi, 00000000h
                  dec ecx
                  inc ecx
                  call 00007FAD78F8A228h
                  sub eax, ecx
                  mov eax, 00B0F000h
                  mov edi, 6BD677D3h
                  and ecx, edi
                  mov ebx, 00B0F000h
                  mov ecx, edi
                  mov esi, 00D68885h
                  add edi, 5C8FFA8Eh
                  mov edi, edi
                  sub ecx, edi
                  mov edx, 00000000h
                  push ecx
                  pop edi
                  mov dl, byte ptr [ebx]
                  sub edi, edi
                  sub edi, 00000001h
                  add ecx, edi
                  mov byte ptr [eax], dl
                  sub edi, E0DB1A86h
                  sub edi, ecx
                  add ecx, D282BA22h
                  add eax, 00000001h
                  mov ecx, 37EA8887h
                  sub edi, B5F3F36Ch
                  sub edi, edi
                  add ebx, 00000000h
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x99d0c20x88.rsrc
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x9690000x340c2.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  UPX00x10000x70e0000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  UPX10x70f0000x25a0000x259e00beac5e0dd3067c0e4d170b7b5e766573unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0x9690000x350000x3420063b52a89e260120116c277a408d2c18bFalse0.7753344199640287data7.107685343929994IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0x9691d80x1b344PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9984833255555157
                  RT_ICON0x98451c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.5053235537678931
                  RT_ICON0x994d440x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.5764052905054322
                  RT_ICON0x998f6c0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.604149377593361
                  RT_ICON0x99b5140x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.6573639774859287
                  RT_ICON0x99c5bc0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.7562056737588653
                  RT_GROUP_ICON0x99ca240x5aTarga image data - Map 32 x 45892 x 1 +10.7777777777777778
                  RT_MANIFEST0x99ca7e0x644XML 1.0 document, ASCII text, with CRLF line terminators0.442643391521197
                  DLLImport
                  KERNEL32.DLLLoadLibraryA, ExitProcess, GetProcAddress, VirtualProtect
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2024-12-17T08:15:15.348358+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.849704172.232.31.180443TCP
                  2024-12-17T08:15:20.799692+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.849707172.67.193.8480TCP
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 17, 2024 08:15:13.314970970 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:13.315016031 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:13.315129042 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:13.330357075 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:13.330370903 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:14.587551117 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:14.587662935 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:14.847412109 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:14.847448111 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:14.847762108 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:14.847836971 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:14.851412058 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:14.895354986 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:15.346709013 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:15.346766949 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:15.346769094 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:15.346813917 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:15.352931976 CET49704443192.168.2.8172.232.31.180
                  Dec 17, 2024 08:15:15.352952003 CET44349704172.232.31.180192.168.2.8
                  Dec 17, 2024 08:15:15.591206074 CET4970580192.168.2.869.16.230.228
                  Dec 17, 2024 08:15:15.710994005 CET804970569.16.230.228192.168.2.8
                  Dec 17, 2024 08:15:15.711056948 CET4970580192.168.2.869.16.230.228
                  Dec 17, 2024 08:15:15.711225033 CET4970580192.168.2.869.16.230.228
                  Dec 17, 2024 08:15:15.830950022 CET804970569.16.230.228192.168.2.8
                  Dec 17, 2024 08:15:16.876827955 CET804970569.16.230.228192.168.2.8
                  Dec 17, 2024 08:15:16.876894951 CET4970580192.168.2.869.16.230.228
                  Dec 17, 2024 08:15:17.399951935 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:15:17.520301104 CET804970664.190.63.136192.168.2.8
                  Dec 17, 2024 08:15:17.520486116 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:15:17.520802021 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:15:17.640665054 CET804970664.190.63.136192.168.2.8
                  Dec 17, 2024 08:15:18.796837091 CET804970664.190.63.136192.168.2.8
                  Dec 17, 2024 08:15:18.797034979 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:15:19.583424091 CET4970780192.168.2.8172.67.193.84
                  Dec 17, 2024 08:15:19.703146935 CET8049707172.67.193.84192.168.2.8
                  Dec 17, 2024 08:15:19.703341007 CET4970780192.168.2.8172.67.193.84
                  Dec 17, 2024 08:15:19.705980062 CET4970780192.168.2.8172.67.193.84
                  Dec 17, 2024 08:15:19.825675011 CET8049707172.67.193.84192.168.2.8
                  Dec 17, 2024 08:15:20.799618006 CET8049707172.67.193.84192.168.2.8
                  Dec 17, 2024 08:15:20.799691916 CET4970780192.168.2.8172.67.193.84
                  Dec 17, 2024 08:15:21.064289093 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:21.064332962 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:21.064412117 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:21.064930916 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:21.064945936 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.290011883 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.290108919 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.297099113 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.297111034 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.297534943 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.297616005 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.298053980 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.343337059 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.725999117 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.726042032 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.726059914 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.726069927 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.726082087 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.726088047 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.726113081 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.726129055 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.726136923 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.726166010 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:22.726186037 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.726224899 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.728993893 CET49708443192.168.2.8104.18.0.75
                  Dec 17, 2024 08:15:22.729013920 CET44349708104.18.0.75192.168.2.8
                  Dec 17, 2024 08:15:23.796545982 CET804970664.190.63.136192.168.2.8
                  Dec 17, 2024 08:15:23.796634912 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:16:21.876657009 CET804970569.16.230.228192.168.2.8
                  Dec 17, 2024 08:16:21.876791954 CET4970580192.168.2.869.16.230.228
                  Dec 17, 2024 08:17:01.340161085 CET4970780192.168.2.8172.67.193.84
                  Dec 17, 2024 08:17:01.340240002 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:17:01.340290070 CET4970580192.168.2.869.16.230.228
                  Dec 17, 2024 08:17:01.460136890 CET804970569.16.230.228192.168.2.8
                  Dec 17, 2024 08:17:01.460459948 CET8049707172.67.193.84192.168.2.8
                  Dec 17, 2024 08:17:01.460556030 CET4970780192.168.2.8172.67.193.84
                  Dec 17, 2024 08:17:01.673438072 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:17:02.282682896 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:17:03.486005068 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:17:05.985836029 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:17:10.876465082 CET4970680192.168.2.864.190.63.136
                  Dec 17, 2024 08:17:20.485935926 CET4970680192.168.2.864.190.63.136
                  TimestampSource PortDest PortSource IPDest IP
                  Dec 17, 2024 08:15:11.297861099 CET6354353192.168.2.81.1.1.1
                  Dec 17, 2024 08:15:12.300710917 CET6354353192.168.2.81.1.1.1
                  Dec 17, 2024 08:15:13.298574924 CET6354353192.168.2.81.1.1.1
                  Dec 17, 2024 08:15:13.308167934 CET53635431.1.1.1192.168.2.8
                  Dec 17, 2024 08:15:13.308190107 CET53635431.1.1.1192.168.2.8
                  Dec 17, 2024 08:15:13.438638926 CET53635431.1.1.1192.168.2.8
                  Dec 17, 2024 08:15:15.353734016 CET6325453192.168.2.81.1.1.1
                  Dec 17, 2024 08:15:15.590281963 CET53632541.1.1.1192.168.2.8
                  Dec 17, 2024 08:15:16.889781952 CET5261253192.168.2.81.1.1.1
                  Dec 17, 2024 08:15:17.398978949 CET53526121.1.1.1192.168.2.8
                  Dec 17, 2024 08:15:18.819210052 CET5945353192.168.2.81.1.1.1
                  Dec 17, 2024 08:15:19.581996918 CET53594531.1.1.1192.168.2.8
                  Dec 17, 2024 08:15:20.862911940 CET5150153192.168.2.81.1.1.1
                  Dec 17, 2024 08:15:21.062962055 CET53515011.1.1.1192.168.2.8
                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                  Dec 17, 2024 08:15:11.297861099 CET192.168.2.81.1.1.10x843fStandard query (0)cutit.orgA (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:12.300710917 CET192.168.2.81.1.1.10x843fStandard query (0)cutit.orgA (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.298574924 CET192.168.2.81.1.1.10x843fStandard query (0)cutit.orgA (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:15.353734016 CET192.168.2.81.1.1.10x7578Standard query (0)ww99.cutit.orgA (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:16.889781952 CET192.168.2.81.1.1.10x1b69Standard query (0)ww1.cutit.orgA (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:18.819210052 CET192.168.2.81.1.1.10xc407Standard query (0)q.gsA (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:20.862911940 CET192.168.2.81.1.1.10x29a4Standard query (0)publisher.linkvertise.comA (IP address)IN (0x0001)false
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Dec 17, 2024 08:15:13.308167934 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.31.180A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.308167934 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.25.148A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.308167934 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.4.213A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.308190107 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.31.180A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.308190107 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.25.148A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.308190107 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.4.213A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.438638926 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.25.148A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.438638926 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.31.180A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:13.438638926 CET1.1.1.1192.168.2.80x843fNo error (0)cutit.org172.232.4.213A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:15.590281963 CET1.1.1.1192.168.2.80x7578No error (0)ww99.cutit.org69.16.230.228A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:17.398978949 CET1.1.1.1192.168.2.80x1b69No error (0)ww1.cutit.orgsedoparking.comCNAME (Canonical name)IN (0x0001)false
                  Dec 17, 2024 08:15:17.398978949 CET1.1.1.1192.168.2.80x1b69No error (0)sedoparking.com64.190.63.136A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:19.581996918 CET1.1.1.1192.168.2.80xc407No error (0)q.gs172.67.193.84A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:19.581996918 CET1.1.1.1192.168.2.80xc407No error (0)q.gs104.21.84.133A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:21.062962055 CET1.1.1.1192.168.2.80x29a4No error (0)publisher.linkvertise.com104.18.0.75A (IP address)IN (0x0001)false
                  Dec 17, 2024 08:15:21.062962055 CET1.1.1.1192.168.2.80x29a4No error (0)publisher.linkvertise.com104.18.1.75A (IP address)IN (0x0001)false
                  • cutit.org
                  • publisher.linkvertise.com
                  • ww99.cutit.org
                  • ww1.cutit.org
                  • q.gs
                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.84970569.16.230.228803892C:\Users\user\Desktop\1iC0WTxgUf.exe
                  TimestampBytes transferredDirectionData
                  Dec 17, 2024 08:15:15.711225033 CET186OUTGET /oxgBR HTTP/1.1
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
                  Cache-Control: no-cache
                  Host: ww99.cutit.org
                  Connection: Keep-Alive
                  Dec 17, 2024 08:15:16.876827955 CET276INHTTP/1.1 302 Moved Temporarily
                  Date: Tue, 17 Dec 2024 07:15:16 GMT
                  Content-Type: text/html
                  Content-Length: 0
                  Connection: keep-alive
                  Location: http://ww1.cutit.org/oxgBR?usid=26&utid=9581496142
                  Cache-Control: no-cache
                  Pragma: no-cache
                  Access-Control-Allow-Origin: *


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.84970664.190.63.136803892C:\Users\user\Desktop\1iC0WTxgUf.exe
                  TimestampBytes transferredDirectionData
                  Dec 17, 2024 08:15:17.520802021 CET209OUTGET /oxgBR?usid=26&utid=9581496142 HTTP/1.1
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Host: ww1.cutit.org
                  Dec 17, 2024 08:15:18.796837091 CET189INHTTP/1.1 403 Forbidden
                  content-length: 93
                  cache-control: no-cache
                  content-type: text/html
                  Data Raw: 3c 68 74 6d 6c 3e 3c 62 6f 64 79 3e 3c 68 31 3e 34 30 33 20 46 6f 72 62 69 64 64 65 6e 3c 2f 68 31 3e 0a 52 65 71 75 65 73 74 20 66 6f 72 62 69 64 64 65 6e 20 62 79 20 61 64 6d 69 6e 69 73 74 72 61 74 69 76 65 20 72 75 6c 65 73 2e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                  Data Ascii: <html><body><h1>403 Forbidden</h1>Request forbidden by administrative rules.</body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  2192.168.2.849707172.67.193.84803892C:\Users\user\Desktop\1iC0WTxgUf.exe
                  TimestampBytes transferredDirectionData
                  Dec 17, 2024 08:15:19.705980062 CET152OUTGET /EVnYC HTTP/1.1
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
                  Host: q.gs
                  Cache-Control: no-cache
                  Dec 17, 2024 08:15:20.799618006 CET898INHTTP/1.1 302 Moved Temporarily
                  Date: Tue, 17 Dec 2024 07:15:20 GMT
                  Content-Type: text/html
                  Content-Length: 143
                  Connection: keep-alive
                  Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
                  Expires: Thu, 01 Jan 1970 00:00:01 GMT
                  Location: https://publisher.linkvertise.com/adfly-hard-migrator/url?url=http://q.gs/EVnYC
                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DShhsGJxxltbHO0pjkONi%2Fi1IT5kxw4nnSxzI2UzQYVJnwu0xa2vhXL7csfUYu0%2F3DJiW6qO7FbP1gI7CabFa%2FKrG3OTdblKLdmDZLuRHVVN7Eh1K1Wr"}],"group":"cf-nel","max_age":604800}
                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                  Server: cloudflare
                  CF-RAY: 8f351f15ff5e42cd-EWR
                  alt-svc: h2=":443"; ma=60
                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 63 6c 6f 75 64 66 6c 61 72 65 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>302 Found</title></head><body><center><h1>302 Found</h1></center><hr><center>cloudflare</center></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  0192.168.2.849704172.232.31.1804433892C:\Users\user\Desktop\1iC0WTxgUf.exe
                  TimestampBytes transferredDirectionData
                  2024-12-17 07:15:14 UTC157OUTGET /oxgBR HTTP/1.1
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
                  Host: cutit.org
                  Cache-Control: no-cache
                  2024-12-17 07:15:15 UTC318INHTTP/1.1 302 Moved Temporarily
                  Server: openresty
                  Date: Tue, 17 Dec 2024 07:15:15 GMT
                  Content-Type: text/html
                  Content-Length: 142
                  Connection: close
                  Accept-CH: Sec-CH-UA, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Mobile
                  Location: http://ww99.cutit.org/oxgBR
                  Cache-Control: no-store, max-age=0
                  2024-12-17 07:15:15 UTC142INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                  Data Ascii: <html><head><title>302 Found</title></head><body><center><h1>302 Found</h1></center><hr><center>openresty</center></body></html>


                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                  1192.168.2.849708104.18.0.754433892C:\Users\user\Desktop\1iC0WTxgUf.exe
                  TimestampBytes transferredDirectionData
                  2024-12-17 07:15:22 UTC237OUTGET /adfly-hard-migrator/url?url=http://q.gs/EVnYC HTTP/1.1
                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
                  Cache-Control: no-cache
                  Host: publisher.linkvertise.com
                  Connection: Keep-Alive
                  2024-12-17 07:15:22 UTC624INHTTP/1.1 403 Forbidden
                  Date: Tue, 17 Dec 2024 07:15:22 GMT
                  Content-Type: text/html; charset=UTF-8
                  Content-Length: 4517
                  Connection: close
                  Referrer-Policy: same-origin
                  Cache-Control: max-age=15
                  Expires: Tue, 17 Dec 2024 07:15:37 GMT
                  Set-Cookie: __cf_bm=j2wv9VHDMaWOcu0prtp_ZXuDURHG.2tm3enKSi30rAE-1734419722-1.0.1.1-HPihD2McldE6XnQAZ2UX9zY93rWTWZVDpkpTuWBj1zBP.mb_RLGMDoJChNzzn21ax_aCbWOk56GbtCCEFznXIA; path=/; expires=Tue, 17-Dec-24 07:45:22 GMT; domain=.linkvertise.com; HttpOnly; Secure; SameSite=None
                  X-Frame-Options: sameorigin
                  Server: cloudflare
                  CF-RAY: 8f351f220d5f8c05-EWR
                  alt-svc: h3=":443"; ma=86400
                  2024-12-17 07:15:22 UTC745INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20
                  Data Ascii: <!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if gt IE
                  2024-12-17 07:15:22 UTC1369INData Raw: 6b 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 69 64 3d 27 63 66 5f 73 74 79 6c 65 73 2d 69 65 2d 63 73 73 27 20 68 72 65 66 3d 22 2f 63 64 6e 2d 63 67 69 2f 73 74 79 6c 65 73 2f 63 66 2e 65 72 72 6f 72 73 2e 69 65 2e 63 73 73 22 20 2f 3e 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 73 74 79 6c 65 3e 62 6f 64 79 7b 6d 61 72 67 69 6e 3a 30 3b 70 61 64 64 69 6e 67 3a 30 7d 3c 2f 73 74 79 6c 65 3e 0a 0a 0a 3c 21 2d 2d 5b 69 66 20 67 74 65 20 49 45 20 31 30 5d 3e 3c 21 2d 2d 3e 0a 3c 73 63 72 69 70 74 3e 0a 20 20 69 66 20 28 21 6e 61 76 69 67 61 74 6f 72 2e 63 6f 6f 6b 69 65 45 6e 61 62 6c 65 64 29 20 7b 0a 20 20 20 20 77 69 6e 64 6f 77 2e 61 64 64 45 76 65 6e 74 4c 69 73 74 65 6e 65 72 28 27 44 4f 4d 43 6f 6e 74 65 6e 74 4c 6f 61 64 65 64 27 2c 20 66
                  Data Ascii: k rel="stylesheet" id='cf_styles-ie-css' href="/cdn-cgi/styles/cf.errors.ie.css" /><![endif]--><style>body{margin:0;padding:0}</style>...[if gte IE 10]>...><script> if (!navigator.cookieEnabled) { window.addEventListener('DOMContentLoaded', f
                  2024-12-17 07:15:22 UTC1369INData Raw: 20 20 20 20 20 3c 68 32 20 64 61 74 61 2d 74 72 61 6e 73 6c 61 74 65 3d 22 62 6c 6f 63 6b 65 64 5f 77 68 79 5f 68 65 61 64 6c 69 6e 65 22 3e 57 68 79 20 68 61 76 65 20 49 20 62 65 65 6e 20 62 6c 6f 63 6b 65 64 3f 3c 2f 68 32 3e 0a 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 70 20 64 61 74 61 2d 74 72 61 6e 73 6c 61 74 65 3d 22 62 6c 6f 63 6b 65 64 5f 77 68 79 5f 64 65 74 61 69 6c 22 3e 54 68 69 73 20 77 65 62 73 69 74 65 20 69 73 20 75 73 69 6e 67 20 61 20 73 65 63 75 72 69 74 79 20 73 65 72 76 69 63 65 20 74 6f 20 70 72 6f 74 65 63 74 20 69 74 73 65 6c 66 20 66 72 6f 6d 20 6f 6e 6c 69 6e 65 20 61 74 74 61 63 6b 73 2e 20 54 68 65 20 61 63 74 69 6f 6e 20 79 6f 75 20 6a 75 73 74 20 70 65 72 66 6f 72 6d 65 64 20 74 72 69 67 67 65 72 65 64 20 74 68 65 20 73 65
                  Data Ascii: <h2 data-translate="blocked_why_headline">Why have I been blocked?</h2> <p data-translate="blocked_why_detail">This website is using a security service to protect itself from online attacks. The action you just performed triggered the se
                  2024-12-17 07:15:22 UTC1034INData Raw: 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 2d 72 65 76 65 61 6c 22 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 2d 72 65 76 65 61 6c 2d 62 74 6e 22 3e 43 6c 69 63 6b 20 74 6f 20 72 65 76 65 61 6c 3c 2f 62 75 74 74 6f 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 68 69 64 64 65 6e 22 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 70 22 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 73 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 20
                  Data Ascii: id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button> <span class="hidden" id="cf-footer-ip">8.46.123.189</span> <span class="cf-footer-separator sm:hidden">&bull;</span> </span> <span class="cf-footer-item


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:02:15:09
                  Start date:17/12/2024
                  Path:C:\Users\user\Desktop\1iC0WTxgUf.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\1iC0WTxgUf.exe"
                  Imagebase:0x400000
                  File size:2'892'482 bytes
                  MD5 hash:530C28302405EDB307C3C0E49C2BD5A7
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Antivirus matches:
                  • Detection: 100%, Avira
                  • Detection: 100%, Joe Sandbox ML
                  Reputation:low
                  Has exited:true

                  Target ID:2
                  Start time:02:15:09
                  Start date:17/12/2024
                  Path:C:\Users\user\Desktop\1iC0WTxgUf.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Users\user\Desktop\1iC0WTxgUf.exe
                  Imagebase:0x400000
                  File size:2'892'482 bytes
                  MD5 hash:795C7666E4950615A6BD5BCA64FF7135
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:low
                  Has exited:false

                  Reset < >

                    Execution Graph

                    Execution Coverage:0.4%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:2.8%
                    Total number of Nodes:323
                    Total number of Limit Nodes:40
                    execution_graph 126806 4087e0 126807 4087e8 126806->126807 126811 408820 GetLastError 126807->126811 126820 40881f GetLastError 126807->126820 126808 4087ee 126812 408835 126811->126812 126813 40883e TlsGetValue 126811->126813 126829 4071d0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126812->126829 126815 408877 SetLastError 126813->126815 126816 40884f LocalAlloc 126813->126816 126815->126808 126817 408862 126816->126817 126818 40886b TlsSetValue 126816->126818 126830 4071d0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126817->126830 126818->126815 126821 408835 126820->126821 126822 40883e TlsGetValue 126820->126822 126831 4071d0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126821->126831 126824 408877 SetLastError 126822->126824 126825 40884f LocalAlloc 126822->126825 126824->126808 126826 408862 126825->126826 126827 40886b TlsSetValue 126825->126827 126832 4071d0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126826->126832 126827->126824 126829->126813 126830->126818 126831->126822 126832->126827 126833 40bef0 126834 40bf04 126833->126834 126837 405c90 126834->126837 126836 40bf25 126838 405cc4 126837->126838 126839 405cad 126837->126839 126841 405d3e 126838->126841 126842 405d2f 126838->126842 126850 405cf6 126838->126850 126855 407150 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126839->126855 126840 405d39 126840->126836 126846 405ded 126841->126846 126851 405d58 126841->126851 126856 405b90 126842->126856 126845 405e2c 126845->126850 126864 406a10 SysFreeString GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126845->126864 126846->126845 126846->126850 126863 407150 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126846->126863 126848 405c90 6 API calls 126848->126850 126850->126840 126850->126848 126852 405dde 126851->126852 126862 406710 SysAllocStringLen GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126851->126862 126853 405b90 5 API calls 126852->126853 126853->126850 126855->126838 126858 405bab 126856->126858 126860 405c0d 126856->126860 126857 405bcd 126857->126860 126866 406a10 SysFreeString GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126857->126866 126858->126857 126865 407150 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126858->126865 126860->126840 126862->126851 126863->126845 126864->126850 126865->126857 126866->126860 126867 407500 126868 40750d 126867->126868 126871 407360 GetProcessHeap HeapFree 126868->126871 126870 407555 126871->126870 126872 407d42 126873 407d44 126872->126873 126875 407d87 126873->126875 126876 407860 126873->126876 126884 407884 126876->126884 126877 4078fd 126878 407a59 126877->126878 126879 4079b2 126877->126879 126880 4079d4 126877->126880 126886 407a43 126878->126886 126907 4071b0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126878->126907 126899 407340 GetProcessHeap HeapAlloc 126879->126899 126882 4079f9 126880->126882 126883 4079df 126880->126883 126888 407a04 126882->126888 126889 407a1e 126882->126889 126903 407340 GetProcessHeap HeapAlloc 126883->126903 126884->126877 126901 408030 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126884->126901 126885 4079c0 126885->126878 126905 407340 GetProcessHeap HeapAlloc 126885->126905 126886->126875 126904 407340 GetProcessHeap HeapAlloc 126888->126904 126900 407340 GetProcessHeap HeapAlloc 126889->126900 126893 4078f3 126902 4080a0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126893->126902 126897 407a34 126897->126878 126897->126886 126906 4071b0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126897->126906 126899->126885 126900->126885 126901->126893 126902->126877 126903->126885 126904->126885 126905->126897 126906->126878 126907->126886 126908 402492 126913 402380 126908->126913 126912 40249f 126914 402395 126913->126914 126924 4023f4 126914->126924 126940 401f80 126914->126940 126918 402458 126974 406670 126918->126974 126923 40246d 126925 406670 5 API calls 126923->126925 126970 4062b0 126924->126970 126927 40247a 126925->126927 126926 4023f0 126926->126924 126930 402418 126926->126930 126931 40241d DeleteFileA 126926->126931 126928 40248c 126927->126928 126981 4063e0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126927->126981 126939 407080 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126928->126939 126930->126931 126966 401e90 56 API calls 126931->126966 126933 40242f 126967 40b750 GetPEB 126933->126967 126935 402437 126968 402310 GetOEMCP 126935->126968 126937 40243f 126969 40be30 GetPEB 126937->126969 126939->126912 126941 401fb6 126940->126941 126942 40205a 126941->126942 126982 4045d0 126941->126982 126944 4062b0 4 API calls 126942->126944 126955 40205f 126944->126955 126945 401fd5 126946 401fe1 126945->126946 126947 401fe6 GetModuleFileNameA 126945->126947 126946->126947 126986 40cae0 GetOEMCP 126947->126986 126949 401ff9 126987 40c040 GetOEMCP 126949->126987 126951 402004 126988 40cb30 GetOEMCP 126951->126988 126953 40200f 126989 40c040 GetOEMCP 126953->126989 126956 402089 126955->126956 126991 4063e0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126955->126991 126960 406a00 126956->126960 126958 40201a 126990 403d50 13 API calls 126958->126990 126992 4067b0 126960->126992 126962 4023e8 126963 40cbd0 126962->126963 126964 40cbe6 126963->126964 126965 40cbeb FindFirstFileA FindClose 126963->126965 126964->126965 126965->126926 126966->126933 126967->126935 126968->126937 126969->126924 126971 4062bb 126970->126971 126972 4062da 126971->126972 127007 407090 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126971->127007 126972->126918 126975 406680 126974->126975 126978 4066a4 126974->126978 126976 4066bc 126975->126976 126975->126978 126979 406688 126975->126979 127008 404b30 126976->127008 126978->126923 126979->126978 126980 405b90 5 API calls 126979->126980 126980->126978 126981->126928 126983 4045eb 126982->126983 126985 404616 126982->126985 126984 40460c GetOEMCP 126983->126984 126983->126985 126984->126985 126985->126945 126986->126949 126987->126951 126988->126953 126989->126958 126990->126942 126991->126956 126993 4067da 126992->126993 127002 406816 126992->127002 126994 406834 126993->126994 126995 4067e4 126993->126995 126993->127002 127005 404ba0 7 API calls 126994->127005 126997 4067f2 126995->126997 126998 40685c 126995->126998 126995->127002 126999 40680d 126997->126999 126997->127002 127003 4068e8 126997->127003 127000 4067b0 7 API calls 126998->127000 126998->127002 126999->127002 127006 405c70 SysFreeString GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 126999->127006 127000->126998 127002->126962 127003->127002 127004 4067b0 7 API calls 127003->127004 127004->127003 127005->127002 127006->127002 127007->126972 127009 404b3b 127008->127009 127010 404b4d 127008->127010 127009->127010 127011 404b44 SysFreeString 127009->127011 127010->126978 127011->127010 127012 40fe57 127013 40fe76 127012->127013 127014 4062b0 4 API calls 127013->127014 127015 40fe7b 127014->127015 127016 40fe8d 127015->127016 127018 4063e0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127015->127018 127018->127016 127019 402189 127020 402196 127019->127020 127021 40219b MoveFileA 127019->127021 127020->127021 127022 4021b0 127021->127022 127042 4042d0 127022->127042 127024 4021c7 127025 4042d0 11 API calls 127024->127025 127026 4021f2 127025->127026 127027 402218 CopyFileA 127026->127027 127050 40cc10 127027->127050 127029 40222f 127071 402090 127029->127071 127031 4022ab 127077 40cd00 127031->127077 127035 4022bf GetCurrentProcess TerminateProcess 127036 4062b0 4 API calls 127035->127036 127039 4022d1 127036->127039 127038 402242 127038->127031 127095 40b1d0 12 API calls 127038->127095 127040 402303 127039->127040 127096 4063e0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127039->127096 127043 4042e5 127042->127043 127044 4045d0 GetOEMCP 127043->127044 127045 404315 127044->127045 127046 404361 127045->127046 127047 40432e GetOEMCP 127045->127047 127048 404338 127045->127048 127046->127024 127047->127048 127097 4049f0 10 API calls 127048->127097 127051 40cc19 127050->127051 127051->127051 127098 409bc0 127051->127098 127060 406d20 4 API calls 127061 40cc71 127060->127061 127062 4045d0 GetOEMCP 127061->127062 127065 40cc82 127062->127065 127064 406d20 4 API calls 127064->127065 127065->127064 127066 40cce0 127065->127066 127118 409fc0 127065->127118 127121 40a090 127066->127121 127069 406d20 4 API calls 127070 40ccf0 127069->127070 127070->127029 127073 4020b2 127071->127073 127072 4062b0 4 API calls 127075 4020f2 127072->127075 127073->127072 127074 402104 127074->127038 127075->127074 127201 4063e0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127075->127201 127078 40cd09 127077->127078 127078->127078 127079 409bc0 7 API calls 127078->127079 127080 40cd3a 127079->127080 127202 409c10 127080->127202 127083 406d20 4 API calls 127084 40cd4f 127083->127084 127086 406d20 4 API calls 127084->127086 127087 40cdf4 127084->127087 127208 409e90 127084->127208 127086->127084 127088 40a090 2 API calls 127087->127088 127089 40cdff 127088->127089 127090 406d20 4 API calls 127089->127090 127091 4022b5 127090->127091 127092 401f10 127091->127092 127093 401f28 127092->127093 127094 401f5c CreateProcessA CloseHandle CloseHandle 127093->127094 127094->127035 127095->127038 127096->127040 127097->127046 127099 409bd5 127098->127099 127125 4050f0 127099->127125 127102 409cd0 127105 409ce3 127102->127105 127103 409d23 127104 409d27 127103->127104 127158 409110 127103->127158 127108 406d20 127104->127108 127105->127103 127105->127104 127107 40a090 2 API calls 127105->127107 127107->127103 127109 406d2e 127108->127109 127110 406d5d 127109->127110 127177 407150 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127109->127177 127112 409ff0 127110->127112 127113 40a00c 127112->127113 127117 40a05a 127113->127117 127178 4090d0 127113->127178 127117->127060 127194 409ec0 127118->127194 127122 40a09d 127121->127122 127123 408f30 2 API calls 127122->127123 127124 40a0d4 127122->127124 127123->127124 127124->127069 127133 405118 127125->127133 127126 4062b0 4 API calls 127127 4051b9 127126->127127 127129 404b30 SysFreeString 127127->127129 127128 40516d 127128->127126 127130 4051c1 127129->127130 127131 4051cb 127130->127131 127148 4063e0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127130->127148 127131->127102 127132 405158 127137 404c30 127132->127137 127133->127128 127133->127132 127134 40514e GetOEMCP 127133->127134 127134->127132 127138 404cf4 127137->127138 127139 404c3f 127137->127139 127140 404b30 SysFreeString 127138->127140 127141 404c52 127139->127141 127142 404c44 127139->127142 127145 404c4b 127140->127145 127144 404ad0 5 API calls 127141->127144 127141->127145 127149 404ad0 127142->127149 127147 404c8a 127144->127147 127145->127128 127146 404b30 SysFreeString 127146->127145 127147->127146 127148->127131 127150 404ae3 SysAllocStringLen 127149->127150 127153 404af9 127149->127153 127151 404af2 127150->127151 127152 404af7 127150->127152 127156 404ab0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127151->127156 127152->127145 127153->127152 127157 404ab0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127153->127157 127156->127152 127157->127152 127159 40912e 127158->127159 127161 409158 127158->127161 127159->127161 127168 408f30 127159->127168 127162 4092d9 CreateFileW 127161->127162 127166 40926d 127161->127166 127163 409316 127162->127163 127164 409331 127162->127164 127163->127164 127173 409090 SetFilePointer 127163->127173 127165 40934c GetLastError 127164->127165 127164->127166 127165->127166 127166->127104 127169 408f3b 127168->127169 127170 408f53 127169->127170 127171 408f3f CloseHandle 127169->127171 127170->127161 127171->127170 127172 408f49 GetLastError 127171->127172 127172->127170 127174 4090b4 GetLastError 127173->127174 127175 4090c7 127173->127175 127174->127175 127176 4090bd GetLastError 127174->127176 127175->127164 127176->127175 127177->127110 127179 4090e1 127178->127179 127186 409010 SetFilePointer 127178->127186 127181 409090 3 API calls 127179->127181 127182 4090f0 127181->127182 127190 409050 SetFilePointer 127182->127190 127184 409103 127185 403760 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127184->127185 127185->127117 127187 409034 GetLastError 127186->127187 127188 409047 127186->127188 127187->127188 127189 40903d GetLastError 127187->127189 127188->127179 127189->127188 127191 409072 GetLastError 127190->127191 127192 409085 127190->127192 127191->127192 127193 40907b GetLastError 127191->127193 127192->127184 127193->127192 127195 409ef5 127194->127195 127196 409f59 127195->127196 127198 408fe0 ReadFile 127195->127198 127196->127065 127199 409004 127198->127199 127200 408ffa GetLastError 127198->127200 127199->127196 127200->127199 127201->127074 127203 409c23 127202->127203 127204 409c63 127203->127204 127205 409c8a 127203->127205 127207 40a090 2 API calls 127203->127207 127204->127205 127206 409110 7 API calls 127204->127206 127205->127083 127206->127205 127207->127204 127211 409d90 127208->127211 127213 409dc5 127211->127213 127212 409e29 127212->127084 127213->127212 127215 408f60 WriteFile 127213->127215 127216 408f8b 127215->127216 127217 408f7f GetLastError 127215->127217 127218 408f92 GetConsoleMode 127216->127218 127220 408f89 127216->127220 127217->127220 127219 408fa0 GetConsoleOutputCP 127218->127219 127218->127220 127219->127220 127220->127212 127221 40ff0e 127228 40fd20 11 API calls 127221->127228 127223 40ff1a 127224 4062b0 4 API calls 127223->127224 127225 40ff1f 127224->127225 127226 40ff31 127225->127226 127229 4063e0 GetProcessHeap HeapFree ExitProcess SetUnhandledExceptionFilter 127225->127229 127228->127223 127229->127226
                    APIs
                    • FindFirstFileA.KERNEL32(?,?,004122A4,?,004023F0,00000000), ref: 0040CBEC
                    • FindClose.KERNEL32(00000000,?,?,004122A4,?,004023F0,00000000), ref: 0040CBF8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID:
                    • API String ID: 2295610775-0
                    • Opcode ID: c00e2105ecc9a42210df76298d796d2c98af70f43de7b7442e998dfa8c5a4d6d
                    • Instruction ID: b6d770ddae04b2a65a0208faa526ad890ad69bd03923240b9f4e3cbf9e65c1ca
                    • Opcode Fuzzy Hash: c00e2105ecc9a42210df76298d796d2c98af70f43de7b7442e998dfa8c5a4d6d
                    • Instruction Fuzzy Hash: ABD0A7B644020253CB2122BA2C829CF725C5B8435CF404BABF62AF71E1F678EA904669
                    APIs
                    • GetProcessHeap.KERNEL32(00000000), ref: 00407346
                    • HeapAlloc.KERNEL32(00000000,00000000), ref: 0040734C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Heap$AllocProcess
                    • String ID:
                    • API String ID: 1617791916-0
                    • Opcode ID: 71c8bb397300a2ec98a85e2a9517822de63f269b3bd78d8ef5f964835f30b907
                    • Instruction ID: 86af24108ca81dc7991541a252e630d5732568c65e495a36e3c27521db029aa8
                    • Opcode Fuzzy Hash: 71c8bb397300a2ec98a85e2a9517822de63f269b3bd78d8ef5f964835f30b907
                    • Instruction Fuzzy Hash: 04B0026465430835D54473B75C07F17755C474D7DDF4004657705B91D258E9E80040BD

                    Control-flow Graph

                    APIs
                    • MoveFileA.KERNEL32(00000000,00000000), ref: 0040219C
                    • CopyFileA.KERNEL32(00000000,00000000,000000FF), ref: 00402219
                    • GetCurrentProcess.KERNEL32(00000000,004142F0,004142F0,000000FF,004142F0,004142F0), ref: 004022C1
                    • TerminateProcess.KERNEL32(00000000,00000000,004142F0,004142F0,000000FF,004142F0,004142F0), ref: 004022C7
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: FileProcess$CopyCurrentMoveTerminate
                    • String ID: !
                    • API String ID: 1606378885-2040151947
                    • Opcode ID: 85730c00616e7aa88c50fde6691587428df64d554575c87f8ff52a89fc2c41a1
                    • Instruction ID: 977d4101561ccfd88836dc27509831d6c9870572d57f55b4357d44abc3d1cc2b
                    • Opcode Fuzzy Hash: 85730c00616e7aa88c50fde6691587428df64d554575c87f8ff52a89fc2c41a1
                    • Instruction Fuzzy Hash: 5241CF70A00109ABCB00EBA6E982ACEB77DAF50349F50417BB510F72E5DB7CEE558758

                    Control-flow Graph

                    APIs
                    • GetLastError.KERNEL32(00000000,?,?,004088E5), ref: 00408825
                    • TlsGetValue.KERNEL32(00000000,?,?,004088E5), ref: 00408844
                    • LocalAlloc.KERNEL32(00000040), ref: 00408857
                    • TlsSetValue.KERNEL32(00000000,00000040), ref: 00408872
                    • SetLastError.KERNEL32(00000000), ref: 00408878
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLastValue$AllocLocal
                    • String ID:
                    • API String ID: 1904213510-0
                    • Opcode ID: ec3e637c03f6bc23e8b06f94060b79e23039758f34d06e98c892f4ff3d7b7ef5
                    • Instruction ID: e59f79d80365a3e3fb04450aaf497140d8717a935e245749f86687b9e21ad49f
                    • Opcode Fuzzy Hash: ec3e637c03f6bc23e8b06f94060b79e23039758f34d06e98c892f4ff3d7b7ef5
                    • Instruction Fuzzy Hash: E8E0303295062157C72233B66C42A9B3558AA487ECB40823AFA907B7F2CA3D9C0156AD

                    Control-flow Graph

                    APIs
                    • GetLastError.KERNEL32(00000000,?,?,004088E5), ref: 00408825
                    • TlsGetValue.KERNEL32(00000000,?,?,004088E5), ref: 00408844
                    • LocalAlloc.KERNEL32(00000040), ref: 00408857
                    • TlsSetValue.KERNEL32(00000000,00000040), ref: 00408872
                    • SetLastError.KERNEL32(00000000), ref: 00408878
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLastValue$AllocLocal
                    • String ID:
                    • API String ID: 1904213510-0
                    • Opcode ID: bb20245ef22a7d6f40216144569e6972df66727ff42a53c437d2256ee92b8ad9
                    • Instruction ID: 8dc0e7b286f4c0757728a67b5893bf4d504377c1db71ad195630fefe0bf8a4e1
                    • Opcode Fuzzy Hash: bb20245ef22a7d6f40216144569e6972df66727ff42a53c437d2256ee92b8ad9
                    • Instruction Fuzzy Hash: CCF0303695052156C72233B26C42A9E35146B487ECB40823EFA907B6F2CA3D8C019A9D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 86 408f60-408f7d WriteFile 87 408f8b-408f90 86->87 88 408f7f-408f89 GetLastError call 4024d0 86->88 89 408f92-408f9e GetConsoleMode 87->89 90 408fd6-408fdc 87->90 88->90 89->90 92 408fa0-408fac GetConsoleOutputCP 89->92 94 408fae-408fb3 92->94 95 408fcf-408fd1 92->95 96 408fb5-408fba 94->96 97 408fcd 94->97 95->90 98 408fd3 95->98 96->95 99 408fbc-408fbf 96->99 97->95 98->90 99->97 100 408fc1-408fc6 99->100 100->95 101 408fc8-408fcb 100->101 101->95 101->97
                    APIs
                    • WriteFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,00409E29,?,?,00000000,?,00409EAB), ref: 00408F76
                    • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,00409E29,?,?,00000000,?,00409EAB), ref: 00408F7F
                    • GetConsoleMode.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,00409E29,?,?,00000000,?,00409EAB), ref: 00408F97
                    • GetConsoleOutputCP.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,00409E29,?,?,00000000,?,00409EAB), ref: 00408FA2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Console$ErrorFileLastModeOutputWrite
                    • String ID:
                    • API String ID: 1666348767-0
                    • Opcode ID: 7e1423d0293c3c8450814a5c97954341b7d247c2fd516e911c28d118bd2fb17a
                    • Instruction ID: 5e54fb8b93e84e2e52b0b7574cfecd6202988ffbac3a19b6b106e2902cad099e
                    • Opcode Fuzzy Hash: 7e1423d0293c3c8450814a5c97954341b7d247c2fd516e911c28d118bd2fb17a
                    • Instruction Fuzzy Hash: 470184316202076AE710A5B58B459AFB69FDB25344F14047BF680F26C5EEBCCF40425D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 102 409110-40912c 103 40917e-4091ae call 408e60 102->103 104 40912e-40913a 102->104 114 4091b0-4091bb 103->114 115 409205-40920a 103->115 106 40915c-409164 104->106 107 40913c-409142 104->107 109 409166-40916d 106->109 110 40916f 106->110 107->103 108 409144-409147 107->108 108->106 112 409149-40914c 108->112 113 409174-409179 109->113 110->113 112->106 118 40914e-409158 call 408f30 112->118 113->103 120 409370-409374 113->120 121 4091cc-4091d1 114->121 122 4091bd-4091ca 114->122 116 40920c-40920e 115->116 117 40924d-409255 115->117 123 409210-409213 116->123 124 40921c-40922b 116->124 126 409257-40925c 117->126 127 40925e 117->127 118->103 121->115 122->121 128 4091d3-4091e4 122->128 129 409215-409218 123->129 130 40922d-40923c 123->130 124->117 134 409263-40926b 126->134 127->134 131 4091e6-4091eb 128->131 132 4091ed-4091fe 128->132 135 40921a 129->135 136 40923e-409248 129->136 130->117 131->115 132->115 137 409200 132->137 138 4092d9-409314 CreateFileW 134->138 139 40926d-409279 134->139 135->117 136->117 137->115 141 409316-40931d 138->141 142 40933b-409342 138->142 139->120 140 40927f-409285 139->140 143 409287-40928a 140->143 144 40929f-4092aa 140->144 141->142 145 40931f-409325 141->145 146 409344-40934a 142->146 147 40934c-409359 GetLastError call 4024d0 142->147 143->120 150 409290-409293 143->150 144->120 145->142 151 409327-409334 call 409090 145->151 146->147 148 409360-409366 146->148 147->148 148->120 153 409368 148->153 154 409295-409298 150->154 155 4092af-4092ba 150->155 151->142 153->120 157 40936b call 4073a0 153->157 158 40929a 154->158 159 4092bf-4092d4 154->159 155->120 157->120 158->120 159->120
                    APIs
                      • Part of subcall function 00408F30: CloseHandle.KERNEL32(?,00000000,?,00409158,?,00000001,?,?,00409CBA,00000000,?,00000000,?,0040CD4A,?), ref: 00408F40
                      • Part of subcall function 00408F30: GetLastError.KERNEL32(?,00000000,?,00409158,?,00000001,?,?,00409CBA,00000000,?,00000000,?,0040CD4A,?), ref: 00408F49
                    • CreateFileW.KERNEL32(00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?,?,00409CBA,00000000,?,00000000,?), ref: 00409303
                    • GetLastError.KERNEL32(00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?,?,00409CBA,00000000,?,00000000,?), ref: 0040934C
                      • Part of subcall function 00409090: SetFilePointer.KERNEL32(?,00000000,00000000,00000002,?,00409331,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 004090A7
                      • Part of subcall function 00409090: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00409331,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 004090B4
                      • Part of subcall function 00409090: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00409331,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 004090BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$File$CloseCreateHandlePointer
                    • String ID: TAA
                    • API String ID: 3997052936-2085441596
                    • Opcode ID: d3733ddfb0e7e577c0298c18dc4c769054a820b33424577d6719cffb3e13174b
                    • Instruction ID: fbde2ecdfd33b0e042bed72ccb3b961f932e12b2e3e8bcd5fa2ac64c2f73668e
                    • Opcode Fuzzy Hash: d3733ddfb0e7e577c0298c18dc4c769054a820b33424577d6719cffb3e13174b
                    • Instruction Fuzzy Hash: 4261A175A0410A9BE710DF94C944BABB7B2FB95350F248177D8057B3EAC3389D41CB99

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 161 401f10-401f49 call 40be70 * 2 166 401f50-401f55 161->166 167 401f4b 161->167 168 401f57 166->168 169 401f5c-401f75 CreateProcessA CloseHandle * 2 166->169 167->166 168->169
                    APIs
                    • CreateProcessA.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000010,?,00000044), ref: 00401F5D
                    • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000010,?,00000044), ref: 00401F65
                    • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,00000010,?,00000044), ref: 00401F6D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CloseHandle$CreateProcess
                    • String ID:
                    • API String ID: 2922976086-0
                    • Opcode ID: c1ebc20cf536f56b8f844b2457054eedeab59e7b4e2f0bfceddc6bf52f73e124
                    • Instruction ID: bb889614db706db821f7bd80dc415af9ecb11a68ed2442f3ba657f91dc1de66e
                    • Opcode Fuzzy Hash: c1ebc20cf536f56b8f844b2457054eedeab59e7b4e2f0bfceddc6bf52f73e124
                    • Instruction Fuzzy Hash: 81F0307294021966DB01E6D58D42FDEB3AC9B08384F504037BB05FB191D7BCAE4847EC

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 170 40900f-409032 SetFilePointer 171 409034-40903b GetLastError 170->171 172 409047-40904e 170->172 171->172 173 40903d-409042 GetLastError call 4024d0 171->173 173->172
                    APIs
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,004090E1,?,?,?,?,0040A053,?,?,?), ref: 00409027
                    • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,004090E1,?,?,?,?,0040A053,?,?,?), ref: 00409034
                    • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,004090E1,?,?,?,?,0040A053,?,?,?), ref: 0040903D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$FilePointer
                    • String ID:
                    • API String ID: 1156039329-0
                    • Opcode ID: f4c837c30341bf957ae10746e550b6b0f85f292638af98aaa8813219fdd00d61
                    • Instruction ID: bbf8a9c75fbbc8451ac7977a2e78ec84ac2944bfbf94f7c87fe414d31b96ef7c
                    • Opcode Fuzzy Hash: f4c837c30341bf957ae10746e550b6b0f85f292638af98aaa8813219fdd00d61
                    • Instruction Fuzzy Hash: 2BE04F70900248AADB10EBB18946B8E77749F84358F204AAAF150B71D6C7BC9A809759

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 175 409010-409032 SetFilePointer 176 409034-40903b GetLastError 175->176 177 409047-40904e 175->177 176->177 178 40903d-409042 GetLastError call 4024d0 176->178 178->177
                    APIs
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,?,004090E1,?,?,?,?,0040A053,?,?,?), ref: 00409027
                    • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,004090E1,?,?,?,?,0040A053,?,?,?), ref: 00409034
                    • GetLastError.KERNEL32(?,00000000,00000000,00000001,?,004090E1,?,?,?,?,0040A053,?,?,?), ref: 0040903D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$FilePointer
                    • String ID:
                    • API String ID: 1156039329-0
                    • Opcode ID: f357eb8abede550e99fef2870db49b0a8a8914b11ee927893b7b85a3906b5492
                    • Instruction ID: 064df41d2300e6b33a0c3cfcc2995e9c0e8f02a5d7ba02c8bdb54f807d45b736
                    • Opcode Fuzzy Hash: f357eb8abede550e99fef2870db49b0a8a8914b11ee927893b7b85a3906b5492
                    • Instruction Fuzzy Hash: C4E04870900208AADB10EBF18D4378EB6789F84358F204569B550B72C6D7BC9A805759

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 180 409090-4090b2 SetFilePointer 181 4090b4-4090bb GetLastError 180->181 182 4090c7-4090ce 180->182 181->182 183 4090bd-4090c2 GetLastError call 4024d0 181->183 183->182
                    APIs
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000002,?,00409331,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 004090A7
                    • GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00409331,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 004090B4
                    • GetLastError.KERNEL32(?,00000000,00000000,00000002,?,00409331,00000000,?,FFFFFFFF,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 004090BD
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$FilePointer
                    • String ID:
                    • API String ID: 1156039329-0
                    • Opcode ID: 16f9fb025df47edaceb564dc37a91d79f97368f173510a5821229960cf516944
                    • Instruction ID: 3e6a962845f3011f357bc5b94b4c558c47dee004cc95fec290fdb19e31e715bc
                    • Opcode Fuzzy Hash: 16f9fb025df47edaceb564dc37a91d79f97368f173510a5821229960cf516944
                    • Instruction Fuzzy Hash: E6E04870900208A6DB10FBF18D4674EB6745F84358F204A69B550B72C6D6B89A805759

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 185 40904f-409070 SetFilePointer 186 409072-409079 GetLastError 185->186 187 409085-409086 185->187 186->187 188 40907b-409080 GetLastError call 4024d0 186->188 188->187
                    APIs
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00409103,00000000,00000000,?,?,?,?,0040A053,?,?,?), ref: 00409068
                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00409103,00000000,00000000,?,?,?,?,0040A053,?,?,?), ref: 00409072
                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00409103,00000000,00000000,?,?,?,?,0040A053,?,?,?), ref: 0040907B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$FilePointer
                    • String ID:
                    • API String ID: 1156039329-0
                    • Opcode ID: 5d7c99ba943189ba79efb52a068e283cf43ae01a7b06849f9c56d686b1e95311
                    • Instruction ID: 37d4942cd1f63b906c899cff13af82457780df02a5d3095b079d0b0d4d523347
                    • Opcode Fuzzy Hash: 5d7c99ba943189ba79efb52a068e283cf43ae01a7b06849f9c56d686b1e95311
                    • Instruction Fuzzy Hash: FDE086709001446ADB04EBB18842AAE7368AFC4358F10867FF994A62D2C67CCE849636

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 190 409050-409070 SetFilePointer 191 409072-409079 GetLastError 190->191 192 409085-409086 190->192 191->192 193 40907b-409080 GetLastError call 4024d0 191->193 193->192
                    APIs
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00409103,00000000,00000000,?,?,?,?,0040A053,?,?,?), ref: 00409068
                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00409103,00000000,00000000,?,?,?,?,0040A053,?,?,?), ref: 00409072
                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,?,00409103,00000000,00000000,?,?,?,?,0040A053,?,?,?), ref: 0040907B
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$FilePointer
                    • String ID:
                    • API String ID: 1156039329-0
                    • Opcode ID: ddc71fc693b9be56bac7002ca11ce5b803b11c986a3015bb4f7bca4cdf806e8b
                    • Instruction ID: a7df7561e7ca9b8e103536b4cd9243158dd27780c66679509c921c4baf12c9f6
                    • Opcode Fuzzy Hash: ddc71fc693b9be56bac7002ca11ce5b803b11c986a3015bb4f7bca4cdf806e8b
                    • Instruction Fuzzy Hash: C1E0803050010466DB04FBE18D0295FB35CDFC4358F10856EFE94672C1D57CDE449576

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 195 409d90-409dc3 196 409dc5-409dcc 195->196 197 409dce 195->197 198 409dd3-409dd8 196->198 197->198 200 409e7e-409e82 198->200 201 409dde-409de9 198->201 202 409e61-409e69 201->202 203 409def-409df4 201->203 204 409e74 202->204 205 409e6b-409e72 202->205 206 409e42-409e4a 203->206 207 409df6-409df9 203->207 208 409e79 204->208 205->208 210 409e55 206->210 211 409e4c-409e53 206->211 207->202 209 409dfb-409dfe 207->209 208->200 209->202 213 409e00-409e24 call 408f60 209->213 214 409e5a-409e5f 210->214 211->214 217 409e29-409e40 213->217 214->200 217->200
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA$TAA
                    • API String ID: 0-3156008175
                    • Opcode ID: 5e2c7e79995b2c56898a416ea621a614e0d6973d165c2e7c0942b4028db62f40
                    • Instruction ID: 29cd27ea3d2a4b46e5796f197d47ddee37a5df3511032d0530e90066fc304b40
                    • Opcode Fuzzy Hash: 5e2c7e79995b2c56898a416ea621a614e0d6973d165c2e7c0942b4028db62f40
                    • Instruction Fuzzy Hash: 53318D347041059FCB04DF58D984A89BBB6FBD9310B24C07AE805EB3A5D734DD418789

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 218 409ec0-409ef3 219 409ef5-409efc 218->219 220 409efe 218->220 221 409f03-409f08 219->221 220->221 223 409fae-409fb2 221->223 224 409f0e-409f19 221->224 225 409f91-409f99 224->225 226 409f1f-409f24 224->226 227 409fa4 225->227 228 409f9b-409fa2 225->228 229 409f30-409f54 call 408fe0 226->229 230 409f26-409f29 226->230 231 409fa9 227->231 228->231 238 409f59-409f70 229->238 232 409f72-409f7a 230->232 233 409f2b-409f2e 230->233 231->223 235 409f85 232->235 236 409f7c-409f83 232->236 233->225 233->229 239 409f8a-409f8f 235->239 236->239 238->223 239->223
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA$TAA
                    • API String ID: 0-3156008175
                    • Opcode ID: 8748c715d46707d2efa6cd81ed7216c42a31401661493585b55b414748257218
                    • Instruction ID: a7d6640e56e4a58b1b431662ec99de768a11d7d198c79bcbc812a19760f4df14
                    • Opcode Fuzzy Hash: 8748c715d46707d2efa6cd81ed7216c42a31401661493585b55b414748257218
                    • Instruction Fuzzy Hash: 91217E747041069FCB04DF48D994A9ABBB6FBD9310B24C07AE805EB3A5D778ED818B48

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 241 409c10-409c21 242 409c23-409c2a 241->242 243 409c2c 241->243 244 409c31-409c36 242->244 243->244 246 409c3c-409c44 244->246 247 409cbd-409cc0 244->247 248 409c46-409c4b 246->248 249 409c67-409c6f 246->249 252 409c86-409c88 248->252 253 409c4d-409c50 248->253 250 409c71-409c78 249->250 251 409c7a 249->251 256 409c7f-409c84 250->256 251->256 257 409ca9-409cb5 call 409110 252->257 258 409c8a-409c92 252->258 254 409c52-409c55 253->254 255 409c5c-409c63 call 40a090 253->255 254->249 259 409c57-409c5a 254->259 255->252 256->247 256->252 266 409cba 257->266 263 409c94-409c9b 258->263 264 409c9d 258->264 259->249 259->255 265 409ca2-409ca7 263->265 264->265 265->247 266->247
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA$TAA
                    • API String ID: 0-3156008175
                    • Opcode ID: 4fb5ddc4b6ab07874e225e53ba391a3718b34b088c9971a158e86a0cdc13088b
                    • Instruction ID: 5d7164e282253a550d28661d1a007b63ea5862aefe256644566d20db0e1fe3f7
                    • Opcode Fuzzy Hash: 4fb5ddc4b6ab07874e225e53ba391a3718b34b088c9971a158e86a0cdc13088b
                    • Instruction Fuzzy Hash: B4115E70B082019BE7109F69E98869676E5BBD2304B24C03B9811AF3E6D33DCC41839D

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 269 409cd0-409ce1 270 409ce3-409cea 269->270 271 409cec 269->271 272 409cf1-409cf6 270->272 271->272 274 409cfc-409d04 272->274 275 409d7f-409d82 272->275 276 409d06-409d0b 274->276 277 409d27-409d2f 274->277 278 409d46-409d48 276->278 279 409d0d-409d10 276->279 280 409d31-409d38 277->280 281 409d3a 277->281 283 409d69-409d77 call 409110 278->283 284 409d4a-409d52 278->284 285 409d12-409d15 279->285 286 409d1c-409d23 call 40a090 279->286 282 409d3f-409d44 280->282 281->282 282->275 294 409d7c 283->294 288 409d54-409d5b 284->288 289 409d5d 284->289 285->277 290 409d17-409d1a 285->290 286->278 293 409d62-409d67 288->293 289->293 290->277 290->286 293->275 294->275
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA$TAA
                    • API String ID: 0-3156008175
                    • Opcode ID: 54db76e4a82ab5dff3fd7f2918ad4cb1fb1d56d7db6c3992cdfa21705980e24e
                    • Instruction ID: 331b10a44ea7a6a2718a0d373256a13008f50e6e0f261d447f880c9a8982c88b
                    • Opcode Fuzzy Hash: 54db76e4a82ab5dff3fd7f2918ad4cb1fb1d56d7db6c3992cdfa21705980e24e
                    • Instruction Fuzzy Hash: C7112E317842059BD7249F6DAC886927765BFA2300B24C1379815AF3ABE63CDD41875D
                    APIs
                    • ReadFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00409F59,?,?,00000000,?,00409FDB,00010000), ref: 00408FF1
                    • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00409F59,?,?,00000000,?,00409FDB,00010000), ref: 00408FFA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorFileLastRead
                    • String ID:
                    • API String ID: 1948546556-0
                    • Opcode ID: a7b5118fc1088943d4a9fbb1ea9edf3d9942a46e451f9963f6ea781a498db719
                    • Instruction ID: 47271d9290f7a1c40665a6210213aff9e8fa2383538dc1c31fb3fd4cb0793cc2
                    • Opcode Fuzzy Hash: a7b5118fc1088943d4a9fbb1ea9edf3d9942a46e451f9963f6ea781a498db719
                    • Instruction Fuzzy Hash: 43D05EB1540148B9EB10A6A14DC6EAF23AC9B8038CF1408AEF040F25E7E6BC8E445636
                    APIs
                    • ReadFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00409F59,?,?,00000000,?,00409FDB,00010000), ref: 00408FF1
                    • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,-00000018,00409F59,?,?,00000000,?,00409FDB,00010000), ref: 00408FFA
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorFileLastRead
                    • String ID:
                    • API String ID: 1948546556-0
                    • Opcode ID: 8877fdc0519c7a4cc03b06452ca6108a2666c8a5f0125462a5deaadd6e7f0f08
                    • Instruction ID: 16ec41326e9365faac48314f316602aaf6d68e7eb541853544c3ca001c6ebae0
                    • Opcode Fuzzy Hash: 8877fdc0519c7a4cc03b06452ca6108a2666c8a5f0125462a5deaadd6e7f0f08
                    • Instruction Fuzzy Hash: 05D05B7150010879EA10A6D54D87E6F725CDB8438CF10086AB540F21D7F5F89E405277
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA
                    • API String ID: 0-1195183021
                    • Opcode ID: 0d75a516953a9fe3f85621269eb82ea4f08c0ad6de64ca4b8ad2c706676fcc06
                    • Instruction ID: 51807a1b2122040739a1ee4006eeeedf0ec76e91885c5e9f45fab3e4fc954ae2
                    • Opcode Fuzzy Hash: 0d75a516953a9fe3f85621269eb82ea4f08c0ad6de64ca4b8ad2c706676fcc06
                    • Instruction Fuzzy Hash: A3019271B043089BD7109E2DD888B5736A9EBD1354F28C037E804EF3A9D67ADC5187AA
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA
                    • API String ID: 0-1195183021
                    • Opcode ID: a8cccd9735913dd047e710a45a3c693ce12f8ce5d48114d8fcb3192fb12e75cf
                    • Instruction ID: c23f76c0cd0550e240eab5971925b9a70b7712a52495b4c00582062789fd8e38
                    • Opcode Fuzzy Hash: a8cccd9735913dd047e710a45a3c693ce12f8ce5d48114d8fcb3192fb12e75cf
                    • Instruction Fuzzy Hash: 59F01D712192498BD7109F5CD98865237A1BBD2300724C077D415EF7A9E73EDCA1571E
                    APIs
                    • CloseHandle.KERNEL32(?,00000000,?,00409158,?,00000001,?,?,00409CBA,00000000,?,00000000,?,0040CD4A,?), ref: 00408F40
                    • GetLastError.KERNEL32(?,00000000,?,00409158,?,00000001,?,?,00409CBA,00000000,?,00000000,?,0040CD4A,?), ref: 00408F49
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CloseErrorHandleLast
                    • String ID:
                    • API String ID: 918212764-0
                    • Opcode ID: 8f274d99a147e50b54a23f130a6af21b789104eaeca9aa044c09992f31765023
                    • Instruction ID: de3a684bfb8de0e994f23643041a810b84f4080b94aa493572bcd5a4d69fd675
                    • Opcode Fuzzy Hash: 8f274d99a147e50b54a23f130a6af21b789104eaeca9aa044c09992f31765023
                    • Instruction Fuzzy Hash: E3C0121020030222DD0032BB2A8260A628D08AA3CCB004C3FBB85B22C3BCBDC880102D
                    APIs
                    • CloseHandle.KERNEL32(?,00000000,?,00409158,?,00000001,?,?,00409CBA,00000000,?,00000000,?,0040CD4A,?), ref: 00408F40
                    • GetLastError.KERNEL32(?,00000000,?,00409158,?,00000001,?,?,00409CBA,00000000,?,00000000,?,0040CD4A,?), ref: 00408F49
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CloseErrorHandleLast
                    • String ID:
                    • API String ID: 918212764-0
                    • Opcode ID: 4b7ba673113eedc8633e88e2f3c97baf2f607fc7a1734be6edc83b1c47b91784
                    • Instruction ID: d3185bb3960970b58c6ab97da122e02abbfcbe02429927c111e3f04b41fdad41
                    • Opcode Fuzzy Hash: 4b7ba673113eedc8633e88e2f3c97baf2f607fc7a1734be6edc83b1c47b91784
                    • Instruction Fuzzy Hash: 6FC01220A0824611DE1133F62A8224A52460CA63CCB008C7FFBC5B66D3EDBCC484502D
                    APIs
                    • GetProcessHeap.KERNEL32(00000000,?,?,00407555,?,00414E04,004084C3,?,?,00413A94,00407074,?,00414324,00407085,0040709A,004062DA), ref: 00407366
                    • HeapFree.KERNEL32(00000000,00000000,?,?,00407555,?,00414E04,004084C3,?,?,00413A94,00407074,?,00414324,00407085,0040709A), ref: 0040736C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Heap$FreeProcess
                    • String ID:
                    • API String ID: 3859560861-0
                    • Opcode ID: b3fd2990f69cfc92f55bb57551e7c34e8dec46aac9d4717318da0e4d3ab60f81
                    • Instruction ID: 1eb9f0d1c59b80b3e689ec80b790dbb5469c768de38cdc21b3ebf7bfe617d84e
                    • Opcode Fuzzy Hash: b3fd2990f69cfc92f55bb57551e7c34e8dec46aac9d4717318da0e4d3ab60f81
                    • Instruction Fuzzy Hash: 92B0026465430C35D54472B75C07F17754C4B4D7DDF404465BB05B91D298E9E804007D
                    APIs
                    • GetOEMCP.KERNEL32(?,00000000,?,?,?,?,00409BE3,?,?,00000000,0040CD3A,?,?,00000000), ref: 0040514E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9c561c42d8472489699f78180848a425270f1fa11a0a3b7fb3aee6b01ac95943
                    • Instruction ID: d3f86761436e4769f37e886df23de5ca6ec870c105c3a365da0caaa363da37b1
                    • Opcode Fuzzy Hash: 9c561c42d8472489699f78180848a425270f1fa11a0a3b7fb3aee6b01ac95943
                    • Instruction Fuzzy Hash: 29216230A0191AABCB10EB99E951ADEB7B5EF44344F104136E801F7391DB34EE05CB98
                    APIs
                      • Part of subcall function 00401F80: GetModuleFileNameA.KERNEL32(00000000,00000000,00000200,00000000), ref: 00401FE9
                      • Part of subcall function 0040CBD0: FindFirstFileA.KERNEL32(?,?,004122A4,?,004023F0,00000000), ref: 0040CBEC
                      • Part of subcall function 0040CBD0: FindClose.KERNEL32(00000000,?,?,004122A4,?,004023F0,00000000), ref: 0040CBF8
                    • DeleteFileA.KERNEL32(00000000,00000000), ref: 0040241E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: File$Find$CloseDeleteFirstModuleName
                    • String ID:
                    • API String ID: 3801553910-0
                    • Opcode ID: a79f544b9dafa49e35823a337a884e47ce4017714d9367e60a040fa1b72ad9e1
                    • Instruction ID: 3e9fb154fd0bdebf0ea1e714c26e85ccbf2130d33045713b0fe4156c11de1d91
                    • Opcode Fuzzy Hash: a79f544b9dafa49e35823a337a884e47ce4017714d9367e60a040fa1b72ad9e1
                    • Instruction Fuzzy Hash: 8721F1309001099BDB10FBB6D9825CD777CAF40348F60847FA411B76D2EB7CDA598A59
                    APIs
                    • SysAllocStringLen.OLEAUT32(00000000,?), ref: 00404AE6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: AllocString
                    • String ID:
                    • API String ID: 2525500382-0
                    • Opcode ID: a8429c9fb71ca2eee19bd2b5da853392bc9ecc96035a4e2ad6dbb7a962620a8e
                    • Instruction ID: 8668621161ff85f4688893ebe78a86cb5a31a9f26558256c830987c2dee529d6
                    • Opcode Fuzzy Hash: a8429c9fb71ca2eee19bd2b5da853392bc9ecc96035a4e2ad6dbb7a962620a8e
                    • Instruction Fuzzy Hash: 3EF0F4B0A04204DBD711DBD9DA4578EB3F4AB44349F1440B6D605B72E1D678EF04DB9A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: D$A
                    • API String ID: 0-2028039342
                    • Opcode ID: b6628395b658e55c5c837456db42903f6e313071886f527379c9d06979955953
                    • Instruction ID: 6a09ce918ec4f4952b42f17593b44b6d33b46f683426e051765fca7cb6675ea3
                    • Opcode Fuzzy Hash: b6628395b658e55c5c837456db42903f6e313071886f527379c9d06979955953
                    • Instruction Fuzzy Hash: ACF0A0727004149FCB00EA5EC881A8BB7E8EF4535471440BAE104E7352D774EE098B99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: D$A
                    • API String ID: 0-2028039342
                    • Opcode ID: eb32ab28c594c37f47dd6cb160035726ef88d61f01fcf2e2ed1e1753d24bf0d0
                    • Instruction ID: 749a490fd3b23600571b89b61c57f56287cbe47e177aa169166ba58e5f1a2f41
                    • Opcode Fuzzy Hash: eb32ab28c594c37f47dd6cb160035726ef88d61f01fcf2e2ed1e1753d24bf0d0
                    • Instruction Fuzzy Hash: 2AF0A0327005149FCB00EA8EC882A8BB3ECEF84354B5440B6E604E7351E6B4EE058B99
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Heap$AllocProcess
                    • String ID:
                    • API String ID: 1617791916-0
                    • Opcode ID: 2756da6422c4a4fb1a4cf5a0a53fa8a1a75f3680513a27726cccdf470ce740a7
                    • Instruction ID: b69b4ac7eb598f4c06a8dcc64aa7554d6671a07a9a2045bb85b7027eebb324fd
                    • Opcode Fuzzy Hash: 2756da6422c4a4fb1a4cf5a0a53fa8a1a75f3680513a27726cccdf470ce740a7
                    • Instruction Fuzzy Hash: 84C1F674E04606CFDB10DF58C584B9EB7F1BB48314F2486BAE915AB391C738AE41CB96
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d824371fede7b6c45edcebe55f4bd7f4aed99052ff95627514ea552154fef930
                    • Instruction ID: 7aab19a6a82f5d6f2e742c853dd97bc7e79273425c4b0314b0993a9bfec6eed2
                    • Opcode Fuzzy Hash: d824371fede7b6c45edcebe55f4bd7f4aed99052ff95627514ea552154fef930
                    • Instruction Fuzzy Hash: D231CB70B082018BD754DE29C5C0B66B3A1BF84314F18C57AD9599B38AD778EC85CB9A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: AllocString
                    • String ID:
                    • API String ID: 2525500382-0
                    • Opcode ID: 59037475fd155a482e5a62e630a7d5894d36e4ecc0293a6776fcb02a92f07c92
                    • Instruction ID: f426aa74437352e114858e9a7265d3c49340466cf0c49e10ac52247323db11ce
                    • Opcode Fuzzy Hash: 59037475fd155a482e5a62e630a7d5894d36e4ecc0293a6776fcb02a92f07c92
                    • Instruction Fuzzy Hash: 14215CB030A5018BE3209E2DC88461AB6E1AFD0344B15453EEBD1EB3D1DB38ED429789
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ddf441eb76e10deed5cc82f090eadcc5c4ad23a3239685db264a57fc3d30b13d
                    • Instruction ID: d871636fa5d7cf43c325b4df59a9e2ec7d989ddb8e2058b1dd42d92be0892578
                    • Opcode Fuzzy Hash: ddf441eb76e10deed5cc82f090eadcc5c4ad23a3239685db264a57fc3d30b13d
                    • Instruction Fuzzy Hash: EA311474A082019FE710DF19C580A5AF7E1FF88314F24CABAE8889B355D739EC45DB86
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1b76e3309e470aa54ec7860e08e304e445b18ba572101e5574426ecc20eaf5a0
                    • Instruction ID: 9be14f816ee4fc389cee1bad8bad6446b88409d80e6bdeefba41a25bed2c55f2
                    • Opcode Fuzzy Hash: 1b76e3309e470aa54ec7860e08e304e445b18ba572101e5574426ecc20eaf5a0
                    • Instruction Fuzzy Hash: 55210335A0415D8BDB20DB15CD88ACDB7B9AF85304F1042F6D888B3251D6B66EC5CF59
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e64e2dd46f2612eeef2655a56e04516730032f6ce19d9f1cfcf63ed10964e621
                    • Instruction ID: 5c59a35e6e16528c49b31edc67dff44608829c9b9c7a156613b7b71352cdb5eb
                    • Opcode Fuzzy Hash: e64e2dd46f2612eeef2655a56e04516730032f6ce19d9f1cfcf63ed10964e621
                    • Instruction Fuzzy Hash: CF212B31A0011D8BDB20EB95CC85BCEB3A99FC4314F1102F7D408B3291D9F89EC88A59
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 80474d53d8746d5fc15e21a479998b666e1f0781f18ccc68acdc2f8e463d9570
                    • Instruction ID: 6a85f5bc11cc1f64ca7b0d8b735abc22ef27422e6e7f299797994b1310b49f58
                    • Opcode Fuzzy Hash: 80474d53d8746d5fc15e21a479998b666e1f0781f18ccc68acdc2f8e463d9570
                    • Instruction Fuzzy Hash: 1921B870B042018BDB54DE59C1C4A66F3A2FF84714F18C5BAD9099F38AD778EC84CB9A
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 163b9dd3cb3a1f39be1a6da9e80c3f80b8cc061680a728e506c9451d1a555fd9
                    • Instruction ID: 0864ca5b04c2769887b6d9357d042df8fb86663a7cb1a9ca62877de9e2e9772a
                    • Opcode Fuzzy Hash: 163b9dd3cb3a1f39be1a6da9e80c3f80b8cc061680a728e506c9451d1a555fd9
                    • Instruction Fuzzy Hash: 8F011D6532451082D629297D1C6D2B702469B4136CB175C3FE003B77E6C83EDD3752AE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e31c819c156f354e2b5c7111c16825a531ed05a3dbb542af1af4cde972ae882a
                    • Instruction ID: c011174cc7f6886c9b2b8c4b8da9cef7ef0049b38afd6999f321335a024f7e7e
                    • Opcode Fuzzy Hash: e31c819c156f354e2b5c7111c16825a531ed05a3dbb542af1af4cde972ae882a
                    • Instruction Fuzzy Hash: 1DF0EC35604B109FD324CF2AC484B42B3E0EF48329F14C97A98599BBA5C378F881DF55
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$FilePointer
                    • String ID:
                    • API String ID: 1156039329-0
                    • Opcode ID: fb93ac02be2b1b4337f020ec637fe9853dce1b70996f550062dd840b2f89bfcd
                    • Instruction ID: a6474941357681142c29cd0b60755786d987bdce75da65f465cd0dd467d4fefe
                    • Opcode Fuzzy Hash: fb93ac02be2b1b4337f020ec637fe9853dce1b70996f550062dd840b2f89bfcd
                    • Instruction Fuzzy Hash: CDE04F76B001146BC700EAAF488198FEBF99FC825472444BEF108E3352D6758E018794
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$FilePointer
                    • String ID:
                    • API String ID: 1156039329-0
                    • Opcode ID: 24b9d5f8d3e75d1dde91d3f34cf7cc5e82a5428f66484c88b21ae2446e93f15d
                    • Instruction ID: ff6be8c59ad0690555e0bdd8975f6dc6db77971b47642a92abf2d4b335dfed85
                    • Opcode Fuzzy Hash: 24b9d5f8d3e75d1dde91d3f34cf7cc5e82a5428f66484c88b21ae2446e93f15d
                    • Instruction Fuzzy Hash: 23E01A76B002146BC700EAEE988198FF7F99BC8654B10447AA608E3302E5759E0187A5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c11619e9dc0b695727ad16f0b8d88c9f4ace06167db76e271ea258c2c83a2b39
                    • Instruction ID: 6a40e7ac55affb6d02ec4f7310c2d2055dc028f317bc9f9accffb0bf9885dd4e
                    • Opcode Fuzzy Hash: c11619e9dc0b695727ad16f0b8d88c9f4ace06167db76e271ea258c2c83a2b39
                    • Instruction Fuzzy Hash: 27E01A357100099BCB00EAE9E98298E77B5AF84354F200076E801F72C5CA38ED008664
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3a458b7f8a0a6f9312e5b16e85df32c0238ab0793265dfebe5429ac29cb2c1d4
                    • Instruction ID: 5769353e307432eb47bc76689703cbedcd35e4e7461d5211f0250b1a1a6eb80d
                    • Opcode Fuzzy Hash: 3a458b7f8a0a6f9312e5b16e85df32c0238ab0793265dfebe5429ac29cb2c1d4
                    • Instruction Fuzzy Hash: ECE08C3632031047EB349A1998853DA73D9EFCC320F4440BAAE19E7383D6786C1987E3
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                    • Instruction ID: 22f366534dd5bc50e1e8ff292aac7f8493e7cc46ed49dca21222df37d835e5ae
                    • Opcode Fuzzy Hash: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                    • Instruction Fuzzy Hash: 1DD05E725002187BD711EB84DC81ECEBBACDF05264F000066AA05A3241D2706E40C7E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                    • Instruction ID: 7c9fbb8cb1c611448c79c9a6bf0767d7fd5b00f67adce62892cdc148ec3d9442
                    • Opcode Fuzzy Hash: ab80f76162070029032e32b6b47482bccdc6471b78007e15be8f24d2d152a89b
                    • Instruction Fuzzy Hash: 17D05E72500218ABDB11DB84DC81ECEBBACDB05264F000066AA45A3241D2706E40C7E5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 58f6289b4f0d92862713f69029bdb8d08f94c75dd29d544d9731ffb18eaa84c8
                    • Instruction ID: afc853210c1cdf66b00935258e506e6ec146a2eaa66ac701c7178a780ca0fe0b
                    • Opcode Fuzzy Hash: 58f6289b4f0d92862713f69029bdb8d08f94c75dd29d544d9731ffb18eaa84c8
                    • Instruction Fuzzy Hash: 80C01222B1000503CB11B7FEA4930CD63A84F44359310847FE403F21C2DE7CC81845BC
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 27dffbf9aea51b8be75411cb6cb8b2b8188108574a0087406c30a01eb87b501b
                    • Instruction ID: 21ff9b9423dbeb2d42e1a38ee45d82564a1068a57674b886a77b0860f703fc1d
                    • Opcode Fuzzy Hash: 27dffbf9aea51b8be75411cb6cb8b2b8188108574a0087406c30a01eb87b501b
                    • Instruction Fuzzy Hash: 05C04CA06006004BC6407BB66D8A54E65957A88309360443EB144D739ADF384401455C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bf740addcec07bb0216c7e1353418296c7b3f4a6a7e40ca4cda3834624186245
                    • Instruction ID: 89e68c26e0da62d653c818a45514acca47735ccf74818470604e8dd374824218
                    • Opcode Fuzzy Hash: bf740addcec07bb0216c7e1353418296c7b3f4a6a7e40ca4cda3834624186245
                    • Instruction Fuzzy Hash: 47A0021494E7866BCB4633F2091618819901C462583C501EBFC90E90D388BC544D412F
                    APIs
                    • InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 0040D7F8
                    • InternetOpenUrlA.WININET(?,?,00000000,00000000,80000000,00000000), ref: 0040D811
                    • InternetReadFile.WININET(?,?,00001389,?), ref: 0040D832
                      • Part of subcall function 00404370: GetOEMCP.KERNEL32(?,?,?,?,00401694,00000000,00000001,?,?,00000000,00000000,?,?,?,?,00000000), ref: 004043E3
                      • Part of subcall function 00404EC0: GetOEMCP.KERNEL32(00000000,?,?,?,004041BD,00000000,?,?,?,?,004049B3,00000000,?,?,?,?), ref: 00404F01
                      • Part of subcall function 00404E50: GetOEMCP.KERNEL32(?,?,00000000,?,0040D8D3,00000000,00000001,00000000,?,?,00001389,?,?,?,00000000,00000000), ref: 00404E92
                    • InternetCloseHandle.WININET(?), ref: 0040D8F6
                    • InternetCloseHandle.WININET(?), ref: 0040D8FE
                    Strings
                    • Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0, xrefs: 0040D751
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Internet$CloseHandleOpen$FileRead
                    • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
                    • API String ID: 3121278467-2759677928
                    • Opcode ID: 1e29e82b67999b5c1ea241c82b88a386ff2bd9b8148375461da42e6f0600d494
                    • Instruction ID: e5eb285b21e476ac6d201a33ca2c25e8ba340444dd1b42a4f136925409b67bcc
                    • Opcode Fuzzy Hash: 1e29e82b67999b5c1ea241c82b88a386ff2bd9b8148375461da42e6f0600d494
                    • Instruction Fuzzy Hash: A151EB74D0021A9ADB21EB52CC42BDEB3B8EF44349F5040FAB605B62D1D7789F858F59
                    APIs
                    • FindFirstFileA.KERNEL32(?,?,004122A4,?,01F917F0,00000000), ref: 01F9BFEC
                    • FindClose.KERNEL32(00000000,?,?,004122A4,?,01F917F0,00000000), ref: 01F9BFF8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Find$CloseFileFirst
                    • String ID:
                    • API String ID: 2295610775-0
                    • Opcode ID: c00e2105ecc9a42210df76298d796d2c98af70f43de7b7442e998dfa8c5a4d6d
                    • Instruction ID: 709551fe7774cf7cd6d358f0906532f09c59764931f30e3b7d2c473ce65b9bdb
                    • Opcode Fuzzy Hash: c00e2105ecc9a42210df76298d796d2c98af70f43de7b7442e998dfa8c5a4d6d
                    • Instruction Fuzzy Hash: F3D0A7B295020313DF2271FD2C91DDF725C5BC4314F044A85F629D7180F977D6918EA1
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: SS
                    • API String ID: 0-573381670
                    • Opcode ID: 1caafce28094b7f3239f546207c9e70a788a57bcea43cedcc37fe0810a849677
                    • Instruction ID: 0c4f7943070cbf30a865c510d6c8365d7c6b5b6f6c0ea367064b1750d2379869
                    • Opcode Fuzzy Hash: 1caafce28094b7f3239f546207c9e70a788a57bcea43cedcc37fe0810a849677
                    • Instruction Fuzzy Hash: CE929125E242068ADF04DBB9D4687FEB671EF4C310F14E13BDC1267392D27D894A9B1A
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: SS
                    • API String ID: 0-573381670
                    • Opcode ID: 234087c2a68913048c2d51ce1291f1bef505b7f84557af040a168c7972ea9ac4
                    • Instruction ID: 16e4314cd72bf9c2539e5da2883346a3e97dea361f63fcfa2fc053d90c55e555
                    • Opcode Fuzzy Hash: 234087c2a68913048c2d51ce1291f1bef505b7f84557af040a168c7972ea9ac4
                    • Instruction Fuzzy Hash: C992F329E24207CADF05DBBCC6683FDBB71EF94720F04C92ED50167296D3B68942AB15
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: I
                    • API String ID: 0-3707901625
                    • Opcode ID: ad5ff3caf1a21b3cc5719dc2805dfd8e18e0c8fbe7f054ddd0d872f2a920075d
                    • Instruction ID: 70d8e54076597817f52263732701928cb815f1f7ac35c8d1450faa8e30379ae9
                    • Opcode Fuzzy Hash: ad5ff3caf1a21b3cc5719dc2805dfd8e18e0c8fbe7f054ddd0d872f2a920075d
                    • Instruction Fuzzy Hash: DC728665D0818BCECF16CAFC86540FDFFB29F57524F1C8689D4A0A7396C2269906EF21
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: I
                    • API String ID: 0-3707901625
                    • Opcode ID: 4b3c1d37a9b7105f7cde9307f14c78572d0f7c9a2c2b9e1c62c9171e90379830
                    • Instruction ID: e69ad79731f42585693c90254294018710c9d7746c4c334e7f803c33f0400c6f
                    • Opcode Fuzzy Hash: 4b3c1d37a9b7105f7cde9307f14c78572d0f7c9a2c2b9e1c62c9171e90379830
                    • Instruction Fuzzy Hash: DB729375D0928A8ECF15CABD84940FEFFB25B1F310F189197D4A17B3D6C2289906DB29
                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: FindResource
                    • String ID:
                    • API String ID: 1635176832-0
                    • Opcode ID: 27290344b71386094c6150c10e5ba3af6ffcbb7aa33e3c10512505393f41d44b
                    • Instruction ID: b0d01ddab0dcffeda4ca72902b852536490fc7903367718964e2fbb5382b3b7c
                    • Opcode Fuzzy Hash: 27290344b71386094c6150c10e5ba3af6ffcbb7aa33e3c10512505393f41d44b
                    • Instruction Fuzzy Hash: 80A002C05243083AF81873A79C0BC37759CC4C2BDC740456D7D01A259268F9FC0040F9
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(0040ADC0,?,01F9A036), ref: 01F9A399
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 950566c23f00ded5e8d7bfc52e2f297d0d20b5bc7b5e942e377effe94d4bfa1a
                    • Instruction ID: aefbf229a3aef46d0056fabbcddb3a52ff27f2b83d21510320c7afc878da7180
                    • Opcode Fuzzy Hash: 950566c23f00ded5e8d7bfc52e2f297d0d20b5bc7b5e942e377effe94d4bfa1a
                    • Instruction Fuzzy Hash: 4AA0025063434A53EE0472AD2C1694E72CD495495DB8044713501F3681DDA9F81044FF
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(0040ADC0,?,0040AC36), ref: 0040AF99
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 950566c23f00ded5e8d7bfc52e2f297d0d20b5bc7b5e942e377effe94d4bfa1a
                    • Instruction ID: 931faed722bb3fb7c5ee59d210f340d5199b7217c70e59f9b912faa8cdfdf078
                    • Opcode Fuzzy Hash: 950566c23f00ded5e8d7bfc52e2f297d0d20b5bc7b5e942e377effe94d4bfa1a
                    • Instruction Fuzzy Hash: CFA0025063434953D90872AE180790A72CD4944B8D78044763D01F7AD299BCF81000BE
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,01F99FFD,?,01F9648A,01F9649A,01F956DA,?,01F90AB2,00000000), ref: 01F9A3A5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 40fbf3f2004cb55a3d711e383b879ecaa65172d0c6901e782c605e39abc23a91
                    • Instruction ID: 84b07ac71d536fe08cd2b1692854432d8a5e43a88030936ad93b41e2792f4454
                    • Opcode Fuzzy Hash: 40fbf3f2004cb55a3d711e383b879ecaa65172d0c6901e782c605e39abc23a91
                    • Instruction Fuzzy Hash: 58A0020026834923F94472966C13B4D758C47519ADF400050A605551C19CC2E40044F7
                    APIs
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,0040ABFD,?,0040708A,0040709A,004062DA,?,004016B2,00000000), ref: 0040AFA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: 40fbf3f2004cb55a3d711e383b879ecaa65172d0c6901e782c605e39abc23a91
                    • Instruction ID: b8b4b26b0db1e3e6f8d93d7d1fcc156ca41ffa4908ae0189e3f343b0063c2932
                    • Opcode Fuzzy Hash: 40fbf3f2004cb55a3d711e383b879ecaa65172d0c6901e782c605e39abc23a91
                    • Instruction Fuzzy Hash: 07A0020026834823E44872975803B05758C4741BDDF400065BE05695D218E5E40000BE
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 90ebd792bcb3a36e27e26b482a46b427b12587962f0e322e1880a4262ae34b3a
                    • Instruction ID: 0022653d1d85206e48cd8a1c5e530b861860b23eabb8b17d14b8903d8203733c
                    • Opcode Fuzzy Hash: 90ebd792bcb3a36e27e26b482a46b427b12587962f0e322e1880a4262ae34b3a
                    • Instruction Fuzzy Hash: EA21D3B2B016064B8B08DE3ECD8556EB7E3ABC8600F58C63D9949D7385DA71DC158B82
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b0b22eeb9b3af0e6112254074e3746d18cf762d9e6e1071ec62d5f148c1a01e0
                    • Instruction ID: 11a1594086bb1b7791405a0fb62cc73e503dccc0cccc06c61f56066ba4e57d18
                    • Opcode Fuzzy Hash: b0b22eeb9b3af0e6112254074e3746d18cf762d9e6e1071ec62d5f148c1a01e0
                    • Instruction Fuzzy Hash: 7721D132F002165B9B0CEE7ECD8556EB7E3BBC8610F58C62D9949D7389DA71DC058B82
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3e80079de06823897951b8b4b06351382aa3037f00725fc5f0e3727ddbca4c4d
                    • Instruction ID: 0c1210f626a014db852d88afbd48290a8f01abe4d88605b267118b7d086dba0d
                    • Opcode Fuzzy Hash: 3e80079de06823897951b8b4b06351382aa3037f00725fc5f0e3727ddbca4c4d
                    • Instruction Fuzzy Hash: 80317E757505018BD718DF2CEC8530A3AE2F7EA309F18C630E915C76B8DB75A819AB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fbb6a9670f35bce615c762f62bb5bb51ed2e5eb32715b1220265124c3571a8d7
                    • Instruction ID: 516074345eb22d4c6417e357eaece1e290071baf1c7c80072ff8c378259c2e56
                    • Opcode Fuzzy Hash: fbb6a9670f35bce615c762f62bb5bb51ed2e5eb32715b1220265124c3571a8d7
                    • Instruction Fuzzy Hash: A2310A717205058BE758CF2DFC8478677E2B7C975AF28C635D924CB2B8DB3698218B48
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fbb6a9670f35bce615c762f62bb5bb51ed2e5eb32715b1220265124c3571a8d7
                    • Instruction ID: 5bca7291bf59406a9e0ab9c08bfc99644265b10755d7d7090c9dbd6603ad0080
                    • Opcode Fuzzy Hash: fbb6a9670f35bce615c762f62bb5bb51ed2e5eb32715b1220265124c3571a8d7
                    • Instruction Fuzzy Hash: 07311C717205018BD358CF2DFC8478677E2B7C9349F29C634D924DB2B8DB35A8218B48
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b0b22eeb9b3af0e6112254074e3746d18cf762d9e6e1071ec62d5f148c1a01e0
                    • Instruction ID: cc767f426579d0800c68189a922befc19794d1c06e7436dc1fbf189c43a6ef3b
                    • Opcode Fuzzy Hash: b0b22eeb9b3af0e6112254074e3746d18cf762d9e6e1071ec62d5f148c1a01e0
                    • Instruction Fuzzy Hash: 4221B472F042054B8B08DE3ECD8556EBBD3ABC8600F58C63E9949E73C9D974DD058786
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 90ebd792bcb3a36e27e26b482a46b427b12587962f0e322e1880a4262ae34b3a
                    • Instruction ID: c1f623a2b91677ed8d94105c987641c858d443f1c2b14066d49298572e7bac43
                    • Opcode Fuzzy Hash: 90ebd792bcb3a36e27e26b482a46b427b12587962f0e322e1880a4262ae34b3a
                    • Instruction Fuzzy Hash: 9E21D371B002154B8B08DE3ECD8556EB7E3AFC8600F59C63E9949D7384DA74DC0AC786
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3e80079de06823897951b8b4b06351382aa3037f00725fc5f0e3727ddbca4c4d
                    • Instruction ID: 5eba3bad484574217c4a3727816ef1cab74f0e7b2ea4b59144fa2d66b4fad649
                    • Opcode Fuzzy Hash: 3e80079de06823897951b8b4b06351382aa3037f00725fc5f0e3727ddbca4c4d
                    • Instruction Fuzzy Hash: E8315C357505018BD718DF2DEC8670B36E2F7EA309F28C634E915C76B8DB74A81AAB50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0aeb576201087f71be3c157f3b07e69f63ba37d2cccc4fa1a9ea97786d7ad5b1
                    • Instruction ID: 3752715316d82318e93781f82f928881896509685cf83248bc14c5444b361179
                    • Opcode Fuzzy Hash: 0aeb576201087f71be3c157f3b07e69f63ba37d2cccc4fa1a9ea97786d7ad5b1
                    • Instruction Fuzzy Hash: 8721D072B002164B9B0CEE7ECD8456EB7E3ABC8610F19C63D9949D7385DE71DC068781
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 34e9acf342599469acf4fb141352183b589c9214a0b841181ea648555d36f7b5
                    • Instruction ID: c4e5a75843b7f0ce8a18759beb80546f10be18c01dc612cd97cf3f8a1ef3e2d9
                    • Opcode Fuzzy Hash: 34e9acf342599469acf4fb141352183b589c9214a0b841181ea648555d36f7b5
                    • Instruction Fuzzy Hash: 9221C1B2B012164B8B0CDE7EC98456EB6E3ABC8640F49C63D9949D7384DEB198068681
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0aeb576201087f71be3c157f3b07e69f63ba37d2cccc4fa1a9ea97786d7ad5b1
                    • Instruction ID: bff3b945e754ea8f53e63047e15c0b29ce31a33237b04b93bd7d2bfed69102c0
                    • Opcode Fuzzy Hash: 0aeb576201087f71be3c157f3b07e69f63ba37d2cccc4fa1a9ea97786d7ad5b1
                    • Instruction Fuzzy Hash: 9A21A472B042164BCB0CDE7EC94456EB6D7ABC8600F19C63E9949E73C4DE709D068686
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 34e9acf342599469acf4fb141352183b589c9214a0b841181ea648555d36f7b5
                    • Instruction ID: 18cb95e432ea895f81178e74ba9cefa9c89d82fe88b2564ab66a071d3ea006c5
                    • Opcode Fuzzy Hash: 34e9acf342599469acf4fb141352183b589c9214a0b841181ea648555d36f7b5
                    • Instruction Fuzzy Hash: 5A21B671B012164B8B0CDE7EC94466EF7D3ABCC600F59C63E9949DB385DE709C0AC686
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dfba68b455c9d2cd484c208e31e540f9bdc4ac9f624e025a2ff0850e99d38e17
                    • Instruction ID: 943c9e6609cc78c560f964e5490e6e101776225d78471c50ac17503d7846b14b
                    • Opcode Fuzzy Hash: dfba68b455c9d2cd484c208e31e540f9bdc4ac9f624e025a2ff0850e99d38e17
                    • Instruction Fuzzy Hash: 93210ABBD3081CC66F5B8658CC4C154ABE2A9B1A74B0C462ECA41D3352E33EEA458694
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dfba68b455c9d2cd484c208e31e540f9bdc4ac9f624e025a2ff0850e99d38e17
                    • Instruction ID: d56c4874c342fecf12705fc3fd2155ca999a7aefe0af823499d470a1c8c010d7
                    • Opcode Fuzzy Hash: dfba68b455c9d2cd484c208e31e540f9bdc4ac9f624e025a2ff0850e99d38e17
                    • Instruction Fuzzy Hash: 2421CF37920A188F8F1886648CC0559F3A3A986757329427FCC51E73C2E33CEE4E869C
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: d31ddf51e7f55e23ed3c70adf41e10783dfa9160ccffc950b82ead93f5e11f9b
                    • Instruction ID: 09f583309889b0a78b5c5c4ae5711d13c79bc57c97b5424f3016fbb327bb73f3
                    • Opcode Fuzzy Hash: d31ddf51e7f55e23ed3c70adf41e10783dfa9160ccffc950b82ead93f5e11f9b
                    • Instruction Fuzzy Hash: B411C8394187805ADB02DB68F8463CB7FA1BB6730CF08458AE451973E2C37C89D8E796
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fce1dc0e4554c1f3db785e4d883f15130780931387aa3c39bc21e43d259004ea
                    • Instruction ID: 691ae678673183ff96a341cf0a0ab9c9b08bbe0644b03b81fb2cb57b8d77effc
                    • Opcode Fuzzy Hash: fce1dc0e4554c1f3db785e4d883f15130780931387aa3c39bc21e43d259004ea
                    • Instruction Fuzzy Hash: 9CF0A838A10249EFDB00EF98D68098CFBF4EB08264F118095EC46E7321D234EE40DB40
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: fce1dc0e4554c1f3db785e4d883f15130780931387aa3c39bc21e43d259004ea
                    • Instruction ID: aed6b168c0062cc165d81befd02394fc8b7b85c5a4d1b54edc5b16b48e4cd749
                    • Opcode Fuzzy Hash: fce1dc0e4554c1f3db785e4d883f15130780931387aa3c39bc21e43d259004ea
                    • Instruction Fuzzy Hash: 90F09B38A10608EFCB00CF98D58198CBBF4EB08328F1044A6E845E7351D334AE409B85
                    APIs
                      • Part of subcall function 01F9C2A0: GetFileAttributesA.KERNEL32(00000000,?,01F911E1,00000000,00000000,00000000,00000000), ref: 01F9C2AD
                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 01F91207
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: AttributesCreateDirectoryFile
                    • String ID: .exe$D"A$ProgramData\Microsoft\$SOFTWARE\Microsoft$T"A$coreinstalled2$iHRYg79zJXaGw1CF5K0d3vZobhAlx6StUBnjOIMpe2yVuPr4sL8DqmQTkEcWNf$yeah
                    • API String ID: 3401506121-4280551177
                    • Opcode ID: 1afce400f2e7446da664eb03a72d901e32a36061753d53bec5e006dda8a77cf0
                    • Instruction ID: 7962ba375ead3b442ddb90878a439c72f652c1f2e1e169c6ab85848de94b59de
                    • Opcode Fuzzy Hash: 1afce400f2e7446da664eb03a72d901e32a36061753d53bec5e006dda8a77cf0
                    • Instruction Fuzzy Hash: 9F41A370E1010AABEF44FFE4CD90BCDB7B9EF50304F508166D518EB254EB76AA468B94
                    APIs
                      • Part of subcall function 01F9C2A0: GetFileAttributesA.KERNEL32(00000000,?,01F911E1,00000000,00000000,00000000,00000000), ref: 01F9C2AD
                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 01F91207
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: AttributesCreateDirectoryFile
                    • String ID: .exe$D"A$ProgramData\Microsoft\$SOFTWARE\Microsoft$T"A$coreinstalled2$iHRYg79zJXaGw1CF5K0d3vZobhAlx6StUBnjOIMpe2yVuPr4sL8DqmQTkEcWNf$yeah
                    • API String ID: 3401506121-4280551177
                    • Opcode ID: febdaf6c46127ac39140f42b82f59c30f71220ce14a45e7625cff05b46233f06
                    • Instruction ID: 11cb406b3bcfd5765703653ad1fbe842d2feb7b301d559b6d020df8888dac613
                    • Opcode Fuzzy Hash: febdaf6c46127ac39140f42b82f59c30f71220ce14a45e7625cff05b46233f06
                    • Instruction Fuzzy Hash: 0A419270E1010AABEF40FFE4CD90BCDB7B9EF50304F508166D518EB250EB76AA468B94
                    APIs
                      • Part of subcall function 0040CEA0: GetFileAttributesA.KERNEL32(00000000,?,00401DE1,00000000,00000000,00000000,00000000), ref: 0040CEAD
                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00401E07
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: AttributesCreateDirectoryFile
                    • String ID: .exe$D"A$ProgramData\Microsoft\$SOFTWARE\Microsoft$T"A$coreinstalled2$iHRYg79zJXaGw1CF5K0d3vZobhAlx6StUBnjOIMpe2yVuPr4sL8DqmQTkEcWNf$yeah
                    • API String ID: 3401506121-4280551177
                    • Opcode ID: 0b729d5ac2df1fdbe1913b4806aad9684babafcdb1c7b327b09311c67c62a8c1
                    • Instruction ID: d57faac4e379b6b6a3d4cb972cb0b490a2fb48aa7090c8370285ce96ad79931b
                    • Opcode Fuzzy Hash: 0b729d5ac2df1fdbe1913b4806aad9684babafcdb1c7b327b09311c67c62a8c1
                    • Instruction Fuzzy Hash: F241CB70E101099BDB00EFE5C9917CEBBB9EF40309F50817AE514FB291DB789A458B98
                    APIs
                      • Part of subcall function 0040CEA0: GetFileAttributesA.KERNEL32(00000000,?,00401DE1,00000000,00000000,00000000,00000000), ref: 0040CEAD
                    • CreateDirectoryA.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000), ref: 00401E07
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: AttributesCreateDirectoryFile
                    • String ID: .exe$D"A$ProgramData\Microsoft\$SOFTWARE\Microsoft$T"A$coreinstalled2$iHRYg79zJXaGw1CF5K0d3vZobhAlx6StUBnjOIMpe2yVuPr4sL8DqmQTkEcWNf$yeah
                    • API String ID: 3401506121-4280551177
                    • Opcode ID: b092cdedddf022eb99e7e18ae1f2d8150b5afb1ff6546a1893b0d951b6f3600c
                    • Instruction ID: 5a1edb74f4a431eea3a4e33c9315e8347f1935b45c70a5397b457ae548f1e1f4
                    • Opcode Fuzzy Hash: b092cdedddf022eb99e7e18ae1f2d8150b5afb1ff6546a1893b0d951b6f3600c
                    • Instruction Fuzzy Hash: 1A41ED30E101099BDB00EFE5C9917CEBBB9EF40308F50817AE514FB291DB78AA45CB98
                    APIs
                    • GetStartupInfoA.KERNEL32(00414260), ref: 01F9A3DA
                    • GetModuleHandleA.KERNEL32(00000000,00414260), ref: 01F9A3EA
                    • GetCurrentProcessId.KERNEL32(00414260), ref: 01F9A4BB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CurrentHandleInfoModuleProcessStartup
                    • String ID: TAA$`BA$dAA$p_@$tAA$tAA
                    • API String ID: 4098904731-249161119
                    • Opcode ID: 9ac8512c1c713e5b3138b62bea2e9e075aa055ffa426ec7e674379c30ffe4eca
                    • Instruction ID: 3561fee1959a15cbe5762f6c31e6963b4df703e74ca6a264166c4a591ac73b2f
                    • Opcode Fuzzy Hash: 9ac8512c1c713e5b3138b62bea2e9e075aa055ffa426ec7e674379c30ffe4eca
                    • Instruction Fuzzy Hash: D0213BB46042069FFF40FBADFC4879A37A1BBE5345B11C175E5048B334EB7A98818B59
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0=B$TOV$TOV$TOV$TOV$`9A$`=B$|FV$|FV$|GV$|GV$|OV
                    • API String ID: 0-2572438103
                    • Opcode ID: 7a1a3a587705047683e29592b939ac6213811e7b4c64c1b3670f129d7c7a2cba
                    • Instruction ID: 8c14ccd1e4612a2f7b292bcd306fab091a5a62f41aecba7bbf0443b9d3d42a97
                    • Opcode Fuzzy Hash: 7a1a3a587705047683e29592b939ac6213811e7b4c64c1b3670f129d7c7a2cba
                    • Instruction Fuzzy Hash: 0A0128B47402401BE7049BA8E8A13877DE2F399344F804539FA1ACF3C4DB65CC059F95
                    APIs
                    • GetStartupInfoA.KERNEL32(00414260), ref: 0040AFDA
                    • GetModuleHandleA.KERNEL32(00000000,00414260), ref: 0040AFEA
                    • GetCurrentProcessId.KERNEL32(00414260), ref: 0040B0BB
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CurrentHandleInfoModuleProcessStartup
                    • String ID: TAA$`BA$dAA$tAA$tAA
                    • API String ID: 4098904731-2967456534
                    • Opcode ID: 9ac8512c1c713e5b3138b62bea2e9e075aa055ffa426ec7e674379c30ffe4eca
                    • Instruction ID: 6d446a7218ea6caff59fd528cba093fa56e2948afde29826009be741a65db01b
                    • Opcode Fuzzy Hash: 9ac8512c1c713e5b3138b62bea2e9e075aa055ffa426ec7e674379c30ffe4eca
                    • Instruction Fuzzy Hash: 85213DB02042049FC740FB6AE84578736A1FBD5349B10C13BF414AB3A5DB7D98818B9E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: xV$<xV$LxV$\xV$\xV$\xV$\xV$`xV$pxV
                    • API String ID: 0-15338477
                    • Opcode ID: b949703924b056e20abd784ad3eccb1401bdb91e0cbc1d0d40e0c949c252b115
                    • Instruction ID: f2dccdcb456a4cccda83b9860916951ec158604587be99b498760dbf8d474f1d
                    • Opcode Fuzzy Hash: b949703924b056e20abd784ad3eccb1401bdb91e0cbc1d0d40e0c949c252b115
                    • Instruction Fuzzy Hash: BFC10474A0011A8BCB25EB59D890BCEB7B5FF58304F1082E9D648A7351CB75AE85CF91
                    APIs
                    • InternetOpenA.WININET(?,00000000,00000000,00000000,00000000), ref: 01F9CBF8
                    • InternetOpenUrlA.WININET(?,?,00000000,00000000,80000000,00000000), ref: 01F9CC11
                    • InternetReadFile.WININET(?,?,00001389,?), ref: 01F9CC32
                      • Part of subcall function 01F93770: GetOEMCP.KERNEL32(?,?,?,?,01F90A94,00000000,00000001,?,?,00000000,00000000,?,?,?,?,00000000), ref: 01F937E3
                      • Part of subcall function 01F942C0: GetOEMCP.KERNEL32(00000000,?,00413020,?,01F935BD,00000000,?,?,?,?,01F93DB3,00000000,?,00413020,00413020,?), ref: 01F94301
                      • Part of subcall function 01F94250: GetOEMCP.KERNEL32(?,?,00000000,?,01F9CCD3,00000000,00000001,00000000,?,?,00001389,?,?,?,00000000,00000000), ref: 01F94292
                    • InternetCloseHandle.WININET(?), ref: 01F9CCF6
                    • InternetCloseHandle.WININET(?), ref: 01F9CCFE
                    Strings
                    • Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0, xrefs: 01F9CB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Internet$CloseHandleOpen$FileRead
                    • String ID: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
                    • API String ID: 3121278467-2759677928
                    • Opcode ID: e32779da7ec875d62d922458c2a4a1873d67fd7c72f8982f63df70cc835da1cd
                    • Instruction ID: e7939c5ebf159b56702486de6c676d646cf9d28b16156328144dcf3411d8bad8
                    • Opcode Fuzzy Hash: e32779da7ec875d62d922458c2a4a1873d67fd7c72f8982f63df70cc835da1cd
                    • Instruction Fuzzy Hash: 40510970D0021A9AEF22FF55CD90BDEB7B8EF14344F5040E5A608A7660DB72AF868F51
                    APIs
                    • GetStdHandle.KERNEL32(000000F6,?,01F97985), ref: 01F999CE
                    • GetStdHandle.KERNEL32(000000F5,?,01F97985), ref: 01F999E3
                    • GetStdHandle.KERNEL32(000000F4,?,01F97985), ref: 01F999F8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Handle
                    • String ID: 47A$47A$t0A$t0A
                    • API String ID: 2519475695-1502439107
                    • Opcode ID: 20d75c4ab9284809afed2bfaabde842ed709339444abbdfa2a25d917fe1eae70
                    • Instruction ID: 09ad4b05c4bf6efe5012d7fcad9e16973f9eb30cc1b870682a4f9e75cdce24d6
                    • Opcode Fuzzy Hash: 20d75c4ab9284809afed2bfaabde842ed709339444abbdfa2a25d917fe1eae70
                    • Instruction Fuzzy Hash: E8414B34B0414A8FFF00FF58EC4069A7262F7D5748B25C23DA5118B678EBBA9942C748
                    APIs
                    • GetStdHandle.KERNEL32(000000F6,?,00408585), ref: 0040A5CE
                    • GetStdHandle.KERNEL32(000000F5,?,00408585), ref: 0040A5E3
                    • GetStdHandle.KERNEL32(000000F4,?,00408585), ref: 0040A5F8
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Handle
                    • String ID: 47A$47A$t0A$t0A
                    • API String ID: 2519475695-1502439107
                    • Opcode ID: 20d75c4ab9284809afed2bfaabde842ed709339444abbdfa2a25d917fe1eae70
                    • Instruction ID: ef9f98f135ddff26811f6b4f01080f1b802519376c5ec46646358c97a97b9c35
                    • Opcode Fuzzy Hash: 20d75c4ab9284809afed2bfaabde842ed709339444abbdfa2a25d917fe1eae70
                    • Instruction Fuzzy Hash: 08415A747042459FD700EB69EC40B9A3272BBD0344B28C23AA4516B7E9EB3DAD52C75E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $A$ $A$ $A$ $A$ $A$ $A$ $A$D$A
                    • API String ID: 0-2258019133
                    • Opcode ID: f6292a220ab3c144034c27f1123dbc8f3f3af1e05437d712f5bfa866173b4f56
                    • Instruction ID: 23a6670e0147a4e751b271641a679751570700be20a8c826d3cdefa4e1437c24
                    • Opcode Fuzzy Hash: f6292a220ab3c144034c27f1123dbc8f3f3af1e05437d712f5bfa866173b4f56
                    • Instruction Fuzzy Hash: 1D81EC74D0114C9BDB00EFD5D991ACEBBB9EF44308F10817AE500B7296D778AE4ACB98
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $A$ $A$ $A$ $A$ $A$ $A$ $A$D$A
                    • API String ID: 0-2258019133
                    • Opcode ID: b4f8394a77bc46313f805f02199b6072cc307e9b5caee6de4151d8d438f9ae96
                    • Instruction ID: 36e2cbe7fe930c20778a5cb25bacd31e9dc75cbc7e5931309fdabc44107ed369
                    • Opcode Fuzzy Hash: b4f8394a77bc46313f805f02199b6072cc307e9b5caee6de4151d8d438f9ae96
                    • Instruction Fuzzy Hash: 6A81DB74D0114C9BDB00EFD5D991ACEBBB9EF44308F10817AE501B7296D778AE4ACB98
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $A$ $A$ $A$ $A$ $A$ $A$ $A$D$A
                    • API String ID: 0-2258019133
                    • Opcode ID: adab06e05071d245d5f8336cd892dac628f072a6abaafee6797695fef5cf04c8
                    • Instruction ID: d5e95b8a1625408bdd3ed5475c4749d5f473cfb65d4370d56897a14d5d4ea13f
                    • Opcode Fuzzy Hash: adab06e05071d245d5f8336cd892dac628f072a6abaafee6797695fef5cf04c8
                    • Instruction Fuzzy Hash: 7A81F934D0114EABEF01FFD4DD90ACEBBBAAF54304F608062D514A7324DB76AE468B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $A$ $A$ $A$ $A$ $A$ $A$ $A$D$A
                    • API String ID: 0-2258019133
                    • Opcode ID: c0241b662cc16649e7760f4c88ece2a4dc1db97a18d240902d99ee665878b094
                    • Instruction ID: 0a4063f3e1e0bd26338f0604b60ccbf9455a1196677aa14e869c2a8ac4fd66b1
                    • Opcode Fuzzy Hash: c0241b662cc16649e7760f4c88ece2a4dc1db97a18d240902d99ee665878b094
                    • Instruction Fuzzy Hash: AC81F934D0114EABEF01FFE4DD90ACEBBB6AF54304F608162D504A7225D776AE468B90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: A$0A$PA$PA$PZ$`A$pA$pA
                    • API String ID: 0-202189810
                    • Opcode ID: 0f098aaf4702ea6a94b64c08949f7b132cb8f2da70019bfa0b0f5ba0ea5bf9f6
                    • Instruction ID: d3814dd9ec7ba3eed20319d3cf3ec17bf7c918b11e5a44629b3731d6ccf50253
                    • Opcode Fuzzy Hash: 0f098aaf4702ea6a94b64c08949f7b132cb8f2da70019bfa0b0f5ba0ea5bf9f6
                    • Instruction Fuzzy Hash: 733142B0A55204CF9380DF6DA95A7863AE1F76A340F10853BB14CCB321E7F598C9AF95
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $hX$File "%s" does not exist$exists$iter class$lgX$p@$write
                    • API String ID: 0-2648232504
                    • Opcode ID: e239598ae9ac9167070c3518481d6d53abffb65348afe839d501462ee7ebdd18
                    • Instruction ID: 53ea9d106cf39ed0daa9bf4cfb0edefa6cac94cb9504299a43ada9e6e6f51737
                    • Opcode Fuzzy Hash: e239598ae9ac9167070c3518481d6d53abffb65348afe839d501462ee7ebdd18
                    • Instruction Fuzzy Hash: 0412AE74E01208DBDB10EFA8C584A8EBBF2FF48304F6081A9D815AB355D775AE45EF85
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $A$ $A$ $A$ $A$ $A$D$A$&A
                    • API String ID: 0-895439832
                    • Opcode ID: 4709fd550304090436b2d986a20ab3778216f36849e2a98fb89a6e60c2d87d2b
                    • Instruction ID: 6d78a0588b1d55b1524c6ca2d2dfda688943d912584be6a640d98a35b2f930dd
                    • Opcode Fuzzy Hash: 4709fd550304090436b2d986a20ab3778216f36849e2a98fb89a6e60c2d87d2b
                    • Instruction Fuzzy Hash: EC91B934D0120E9BEF01FFD4DD90ACEBBB6AF54304F604166D514AB265DB72AE46CB90
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: A$0A$PA$PA$`A$pA$pA
                    • API String ID: 0-2706859774
                    • Opcode ID: 0f098aaf4702ea6a94b64c08949f7b132cb8f2da70019bfa0b0f5ba0ea5bf9f6
                    • Instruction ID: d7a90a14c4092424e225e95f22d705b7f8f44652e623df0cc239691cb8372661
                    • Opcode Fuzzy Hash: 0f098aaf4702ea6a94b64c08949f7b132cb8f2da70019bfa0b0f5ba0ea5bf9f6
                    • Instruction Fuzzy Hash: B33147B0A55204CF9380DF6DA95A3463AE1F766344B51853BB14CCB321E3F898C9AF99
                    APIs
                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?,00000000), ref: 01F909FD
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 01F90A1E
                    • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 01F90A36
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 01F90A72
                    • RegCloseKey.ADVAPI32(?,00000000,00000001,?,?,00000000,00000000,?,?,?,?,00000000,?,00000000,00000000), ref: 01F90AA8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CloseQueryValue$Open
                    • String ID:
                    • API String ID: 4082589901-0
                    • Opcode ID: ee7ccb10c0f234961aa9c38694839e7a0bd89e46a806b6b3629d912f844ba51e
                    • Instruction ID: a4aeb8be0d8de98a74b4052d591d7a84d70780cb467863e9fb1310df1b65acbb
                    • Opcode Fuzzy Hash: ee7ccb10c0f234961aa9c38694839e7a0bd89e46a806b6b3629d912f844ba51e
                    • Instruction Fuzzy Hash: 1C319771A00159ABFF22FA58CC81BDE767DDF54380F1041A2F548E6250DAB69EC48AA4
                    APIs
                    • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?,00000000), ref: 004015FD
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 0040161E
                    • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,?,00000000), ref: 00401636
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 00401672
                    • RegCloseKey.ADVAPI32(?,00000000,00000001,?,?,00000000,00000000,?,?,?,?,00000000,?,00000000,00000000), ref: 004016A8
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CloseQueryValue$Open
                    • String ID:
                    • API String ID: 4082589901-0
                    • Opcode ID: edf0df0a5bb6c5c8aa50bc8d1d021be57945f99c23e02fe8bacf702e362ed3b4
                    • Instruction ID: f6879b41b9b4c4f0b71ac12d9fec265e1ed28802e0bbcf59a9dc75bd23dc144e
                    • Opcode Fuzzy Hash: edf0df0a5bb6c5c8aa50bc8d1d021be57945f99c23e02fe8bacf702e362ed3b4
                    • Instruction Fuzzy Hash: 01316171A00154ABDB21AA55CC82BDA727CDF44384F1040B7F545F72E0D6B99EC48A68
                    APIs
                    • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 01F90B14
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 01F90B32
                    • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 01F90B51
                    • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 01F90B8C
                    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000001,?,?,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 01F90B94
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CloseValue$CreateQuery
                    • String ID:
                    • API String ID: 1259008579-0
                    • Opcode ID: 85a184cb3fbbcf72b875e0db3f72afdcecbd18462e5f57835c861d8f7a204abc
                    • Instruction ID: 31f2c1d11c86cdebf22cf314d4c54cccad29108cfe501cee07b6883aece62cb0
                    • Opcode Fuzzy Hash: 85a184cb3fbbcf72b875e0db3f72afdcecbd18462e5f57835c861d8f7a204abc
                    • Instruction Fuzzy Hash: CF212F71B4020ABBFF21AEAD8C41FAEBBBDEB40744F144465F604EB251DA76DD408B54
                    APIs
                    • RegCreateKeyExA.ADVAPI32(?,?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00401714
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00401732
                    • RegCloseKey.ADVAPI32(?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,00000000), ref: 00401751
                    • RegSetValueExA.ADVAPI32(?,?,00000000,00000001,?,?,?,?,00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 0040178C
                    • RegCloseKey.ADVAPI32(?,?,?,00000000,00000001,?,?,?,?,00000000,?,00000000,00000000,?,?,00000000), ref: 00401794
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CloseValue$CreateQuery
                    • String ID:
                    • API String ID: 1259008579-0
                    • Opcode ID: 7768b3c341911f3df32eacb2cd281c2466913b327779d88379c2aedd13139201
                    • Instruction ID: 2526327ca8a497ff1f397d489966f378bc4f03016c463e3b205b2be09f3d5001
                    • Opcode Fuzzy Hash: 7768b3c341911f3df32eacb2cd281c2466913b327779d88379c2aedd13139201
                    • Instruction Fuzzy Hash: 30213074B40205BBEB219AAA9C82FAF77A9EB40784F104477F505FB2F1D7789D408758
                    APIs
                    • ExitProcess.KERNEL32(?,01F9648A,01F9649A,01F956DA,?,01F90AB2,00000000), ref: 01F9A009
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ExitProcess
                    • String ID: 0PA$47A$t0A
                    • API String ID: 621844428-3436806125
                    • Opcode ID: 35134e7b00927fcbf88c56a4135db35b3841cb01b06faf96d7b2583a838b5153
                    • Instruction ID: f67181848f250ce4a055cfb54819ba7f790079bb12c88c8bd5b361ac72180edf
                    • Opcode Fuzzy Hash: 35134e7b00927fcbf88c56a4135db35b3841cb01b06faf96d7b2583a838b5153
                    • Instruction Fuzzy Hash: DB116A707140069FFF10FB58EC447D9BAA2BBD438CF26C038E5068B228DBA798428749
                    APIs
                    • ExitProcess.KERNEL32(?,0040708A,0040709A,004062DA,?,004016B2,00000000), ref: 0040AC09
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ExitProcess
                    • String ID: 0PA$47A$t0A
                    • API String ID: 621844428-3436806125
                    • Opcode ID: 2afbc147f6ff4bcebb1603dc6f8f69ee3771419cf6d8d27b84d764585a76a55f
                    • Instruction ID: 7df8ff39b4e0162027718901dfd5ddbbde8923651b7e6164a533e1097f8e71d2
                    • Opcode Fuzzy Hash: 2afbc147f6ff4bcebb1603dc6f8f69ee3771419cf6d8d27b84d764585a76a55f
                    • Instruction Fuzzy Hash: C81147746082058FD710EF69E84179A36B3BB90348F24C13AE6016B3A9DB7CAD52874F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: File "%s" does not exist$exists$iter class$p@$write
                    • API String ID: 0-2607739891
                    • Opcode ID: 57a8cf81e16b440aa999ca1fb1da432de821fd1ade88c4564b231050283d094e
                    • Instruction ID: fa3794d84cdc4a09f18c77f69c2e777c0067077841b516cbbe89a7713199b8da
                    • Opcode Fuzzy Hash: 57a8cf81e16b440aa999ca1fb1da432de821fd1ade88c4564b231050283d094e
                    • Instruction Fuzzy Hash: B712C134E00208DFDB10DFA9C585A9EBBF1FF48304F6081AAE915AB355D778AE458F85
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $A$ $A$ $A$ $A$ $A
                    • API String ID: 0-829398541
                    • Opcode ID: a61d2ed9fd4a549a16a343a1b1a63df943c3cbc42c2163bcbd6144867c5e726a
                    • Instruction ID: 6aaac6c44f0f72b5249ae851caf74af5a3d30edae998ea37dbb8c49a91fe17aa
                    • Opcode Fuzzy Hash: a61d2ed9fd4a549a16a343a1b1a63df943c3cbc42c2163bcbd6144867c5e726a
                    • Instruction Fuzzy Hash: 65311E3090010CEBDB01EBD6D991BCEBBB9EF44308F20407AF501B7292D779AA59CB95
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $A$ $A$ $A$ $A$ $A
                    • API String ID: 0-829398541
                    • Opcode ID: 0c2b73941235871d3ea911fd5a8620b270e8ac5899910170dae00070292fe1b2
                    • Instruction ID: faf047bb94d098b1fd43b4922170db9868c1858690b00d3627bcbc46e38d76ae
                    • Opcode Fuzzy Hash: 0c2b73941235871d3ea911fd5a8620b270e8ac5899910170dae00070292fe1b2
                    • Instruction Fuzzy Hash: AC31103090110EABEF01FFD5DD90BCEBBB9AF54344F504022E500A7365D776AA569B91
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $CA$4CA$DCA$DCA$DCA
                    • API String ID: 0-632339749
                    • Opcode ID: 5ed7db0a50857e69bae277f51265bc428c83fe4079d019bd0c5aada238381d61
                    • Instruction ID: 02913e5beaa1fa59717fccbd0d1023f757ebe6e8ed99dc11b6a158d79a90530a
                    • Opcode Fuzzy Hash: 5ed7db0a50857e69bae277f51265bc428c83fe4079d019bd0c5aada238381d61
                    • Instruction Fuzzy Hash: D421ED707041058FD714EB59E880B9673B6BBD5340B2AC0BAE812AB3B5DB79DC12CB5D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$d0A$dAA$tAA$tAA
                    • API String ID: 0-832756125
                    • Opcode ID: 447405897af0aa2f06e3d7638467cd543f7d50c62273e58aee5ea8159a1222d6
                    • Instruction ID: 067762425ce786b8a7c26f3dfe7840673a9a66ec1ba66b31229be536fa539837
                    • Opcode Fuzzy Hash: 447405897af0aa2f06e3d7638467cd543f7d50c62273e58aee5ea8159a1222d6
                    • Instruction Fuzzy Hash: DC11BA70724302DFFB50FF69EC886993A62BBE5301725C63591428B338E7769841CF58
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$d0A$dAA$tAA$tAA
                    • API String ID: 0-832756125
                    • Opcode ID: 447405897af0aa2f06e3d7638467cd543f7d50c62273e58aee5ea8159a1222d6
                    • Instruction ID: 322c511306d272571a832be4a7610073f72e3fbaaa876a8b0cb6830d4d3ded73
                    • Opcode Fuzzy Hash: 447405897af0aa2f06e3d7638467cd543f7d50c62273e58aee5ea8159a1222d6
                    • Instruction Fuzzy Hash: EE11F970704201AFC740EF69ED8869636A1BBE9305725C43AA141AB3A9DF79CC42CB5D
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: `%A$`%A$`&A$p'A$%A
                    • API String ID: 0-2029066775
                    • Opcode ID: dfa6dd7848eb23a55b61529bf380ad1011d28b58bdb845fe59dd72e02c734572
                    • Instruction ID: 78fa922e4a358171580d27fe7aadca8edc5346198a3e385e2798f85a022b7b80
                    • Opcode Fuzzy Hash: dfa6dd7848eb23a55b61529bf380ad1011d28b58bdb845fe59dd72e02c734572
                    • Instruction Fuzzy Hash: 0B11FE79A002108BC350DF2DE9842867BF1FB66344B40812BD516D7760E3789C99EB99
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: `%A$`%A$`&A$p'A$%A
                    • API String ID: 0-2029066775
                    • Opcode ID: 3acc88694ff80eff0ff3a352232f246a6e419a1682ad4ebdb0d1ae4888cfd905
                    • Instruction ID: f1473381088832e918a9bb042776f4cd8200ee36a8b22e4e8676ca0068f029de
                    • Opcode Fuzzy Hash: 3acc88694ff80eff0ff3a352232f246a6e419a1682ad4ebdb0d1ae4888cfd905
                    • Instruction Fuzzy Hash: BD110C7AA00201CBC351DF2DEE843867BF1FB6A304B00812AD516C7770E375A899EB99
                    APIs
                    • GetLastError.KERNEL32(00000000,?,?,01F97CE5), ref: 01F97C25
                    • TlsGetValue.KERNEL32(00000000,?,?,01F97CE5), ref: 01F97C44
                    • LocalAlloc.KERNEL32(00000040), ref: 01F97C57
                    • TlsSetValue.KERNEL32(00000000,00000040), ref: 01F97C72
                    • SetLastError.KERNEL32(00000000), ref: 01F97C78
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLastValue$AllocLocal
                    • String ID:
                    • API String ID: 1904213510-0
                    • Opcode ID: ec3e637c03f6bc23e8b06f94060b79e23039758f34d06e98c892f4ff3d7b7ef5
                    • Instruction ID: 1ad79b83db5868784ef129882f9195e2c7918f51b5c1116fc532124b7aa90784
                    • Opcode Fuzzy Hash: ec3e637c03f6bc23e8b06f94060b79e23039758f34d06e98c892f4ff3d7b7ef5
                    • Instruction Fuzzy Hash: 0FE06531960B3767EF2337B96C4199E354C9B907F4F105230E651672A2EE13980156EC
                    APIs
                    • GetLastError.KERNEL32(00000000,?,?,01F97CE5), ref: 01F97C25
                    • TlsGetValue.KERNEL32(00000000,?,?,01F97CE5), ref: 01F97C44
                    • LocalAlloc.KERNEL32(00000040), ref: 01F97C57
                    • TlsSetValue.KERNEL32(00000000,00000040), ref: 01F97C72
                    • SetLastError.KERNEL32(00000000), ref: 01F97C78
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLastValue$AllocLocal
                    • String ID:
                    • API String ID: 1904213510-0
                    • Opcode ID: bb20245ef22a7d6f40216144569e6972df66727ff42a53c437d2256ee92b8ad9
                    • Instruction ID: 478f96034756d82c57abc8df1e87acacc3c0ced310bb21086b5d5a9c86f347ed
                    • Opcode Fuzzy Hash: bb20245ef22a7d6f40216144569e6972df66727ff42a53c437d2256ee92b8ad9
                    • Instruction Fuzzy Hash: 9EF06535960A3757EF3337B86C4099E35486F907B4F105334E651772B2EE1388019B98
                    APIs
                    • MoveFileA.KERNEL32(00000000,00000000), ref: 01F9159C
                    • CopyFileA.KERNEL32(00000000,00000000,000000FF), ref: 01F91619
                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000), ref: 01F916C1
                    • TerminateProcess.KERNEL32(00000000,00000000,00000000,00000000,000000FF,00000000,00000000,00000000), ref: 01F916C7
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: FileProcess$CopyCurrentMoveTerminate
                    • String ID:
                    • API String ID: 1606378885-0
                    • Opcode ID: 3ebebf1af7d38a6ed21ed9c8ad2763cbdbccb344e3ae9cf0436b91bcdb2efe79
                    • Instruction ID: de5e916ac60d79ae96318943d878fc654391d0c66921d59035dfc3237b22c835
                    • Opcode Fuzzy Hash: 3ebebf1af7d38a6ed21ed9c8ad2763cbdbccb344e3ae9cf0436b91bcdb2efe79
                    • Instruction Fuzzy Hash: EB51C870A1110BABEF51FFA4ED80BCEB7B9AF60354F604135E014E7250EB76EA458B94
                    APIs
                    • WriteFile.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,01F99229,?,?,00000000,?,01F992AB), ref: 01F98376
                    • GetLastError.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,01F99229,?,?,00000000,?,01F992AB), ref: 01F9837F
                    • GetConsoleMode.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,01F99229,?,?,00000000,?,01F992AB), ref: 01F98397
                    • GetConsoleOutputCP.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,-00000018,01F99229,?,?,00000000,?,01F992AB), ref: 01F983A2
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Console$ErrorFileLastModeOutputWrite
                    • String ID:
                    • API String ID: 1666348767-0
                    • Opcode ID: 7e1423d0293c3c8450814a5c97954341b7d247c2fd516e911c28d118bd2fb17a
                    • Instruction ID: 32db3000f60dd71a98c54a1457cac21e33c4e9224170fe06399009205b968f2a
                    • Opcode Fuzzy Hash: 7e1423d0293c3c8450814a5c97954341b7d247c2fd516e911c28d118bd2fb17a
                    • Instruction Fuzzy Hash: 5501867292021EEAFF11B6FCCE44DAE7A9EDB121D0F141461EA11D2160F7F7DE048295
                    APIs
                      • Part of subcall function 01F98330: CloseHandle.KERNEL32(?,00000000,?,01F98558,?,00000001,?,?,01F990BA,00000000,?,00000000,?,01F9C14A,?), ref: 01F98340
                      • Part of subcall function 01F98330: GetLastError.KERNEL32(?,00000000,?,01F98558,?,00000001,?,?,01F990BA,00000000,?,00000000,?,01F9C14A,?), ref: 01F98349
                    • CreateFileW.KERNEL32(00000000,?,00411350,0000000C,00000003,00000080,00000000,?,00000001,?,?,01F990BA,00000000,?,00000000,?), ref: 01F98703
                    • GetLastError.KERNEL32(00000000,?,00411350,0000000C,00000003,00000080,00000000,?,00000001,?,?,01F990BA,00000000,?,00000000,?), ref: 01F9874C
                      • Part of subcall function 01F98490: SetFilePointer.KERNEL32(?,00000000,00000000,00000002,?,01F98731,00000000,?,00411350,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 01F984A7
                      • Part of subcall function 01F98490: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,01F98731,00000000,?,00411350,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 01F984B4
                      • Part of subcall function 01F98490: GetLastError.KERNEL32(?,00000000,00000000,00000002,?,01F98731,00000000,?,00411350,0000000C,00000003,00000080,00000000,?,00000001,?), ref: 01F984BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLast$File$CloseCreateHandlePointer
                    • String ID: TAA
                    • API String ID: 3997052936-2085441596
                    • Opcode ID: 6db5dc6e73ee0594e1beadda6863456c1d883b4926029fd2ad7e9a9bafc5fe0c
                    • Instruction ID: 001ce4bf0e5063423178ae694eac77e3f57838f60778e04120a01bd0b80e31d1
                    • Opcode Fuzzy Hash: 6db5dc6e73ee0594e1beadda6863456c1d883b4926029fd2ad7e9a9bafc5fe0c
                    • Instruction Fuzzy Hash: 15615FB5E0410ECBFF11EF58C9446AEBBB2FB96390F248121D504AB368D3369D45CBA5
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 0040A216
                    • GetCommandLineA.KERNEL32(00000000,?,00000104), ref: 0040A256
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CommandFileLineModuleName
                    • String ID: PBA
                    • API String ID: 2151003578-1349102371
                    • Opcode ID: 6f56a806e4ac7feb7590663b001053bb06a6925b336661b1eae582c02bc71eb5
                    • Instruction ID: c01dd440daa73386bf30b4bb7223a67f7704861ccc5b13a1fc4bff4d504b352f
                    • Opcode Fuzzy Hash: 6f56a806e4ac7feb7590663b001053bb06a6925b336661b1eae582c02bc71eb5
                    • Instruction Fuzzy Hash: 1751E371C083988BDB358F2488457D9BBA0AB52304F1845FAC8D577392C3B95DD58F5B
                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 01F99616
                    • GetCommandLineA.KERNEL32(00000000,?,00000104), ref: 01F99656
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: CommandFileLineModuleName
                    • String ID: PBA
                    • API String ID: 2151003578-1349102371
                    • Opcode ID: fdc28c1fad10a1cfd4009d0dfb19af802536b96daa4f7dfb17c413c7b77fe5e2
                    • Instruction ID: 13173e058c833485a8c07f79abfb4f3818ab1933a877bf868c20f9459fe00f58
                    • Opcode Fuzzy Hash: fdc28c1fad10a1cfd4009d0dfb19af802536b96daa4f7dfb17c413c7b77fe5e2
                    • Instruction Fuzzy Hash: 9351BFB5C082988BFF36AF2888447D8BBA1BB52308F0945CDC5D95B251C6F65AC5CF92
                    APIs
                    • GetOEMCP.KERNEL32(?,00413DF4,01F98BB3,00413DF4,01F999BC,?,01F99A2C,?,01F97985), ref: 01F98B34
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA
                    • API String ID: 0-1195183021
                    • Opcode ID: ead93c5d8cc7c4cdf99e2af3c27b1418081fb850bc23898e23c81d9b5a887dd7
                    • Instruction ID: 2059d33ac19bce2949f24f43f90c68e2ed1191ceffc0aaf917c66d26237820b6
                    • Opcode Fuzzy Hash: ead93c5d8cc7c4cdf99e2af3c27b1418081fb850bc23898e23c81d9b5a887dd7
                    • Instruction Fuzzy Hash: EB1170B6610249DAFF14BF2CD8882A23B65FB97390F0CC066D8058F369D77AC940C754
                    APIs
                    • GetOEMCP.KERNEL32(?,00413DF4,004097B3,00413DF4,0040A5BC,?,0040A62C,?,00408585), ref: 00409734
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: TAA$TAA
                    • API String ID: 0-1195183021
                    • Opcode ID: ead93c5d8cc7c4cdf99e2af3c27b1418081fb850bc23898e23c81d9b5a887dd7
                    • Instruction ID: 84c2cb7eea715656d657b082394d2a76faad7ed860493c23d21e8f6d26e5e3e1
                    • Opcode Fuzzy Hash: ead93c5d8cc7c4cdf99e2af3c27b1418081fb850bc23898e23c81d9b5a887dd7
                    • Instruction Fuzzy Hash: 5611797A224241CBCB14AF68D8886A62765FB95300F18C477E805AF3EBE33DCD41C769
                    APIs
                    • MessageBoxA.USER32(00000000,00415050,Error,00000000), ref: 01F9990F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Message
                    • String ID: Error$PPA
                    • API String ID: 2030045667-1706176930
                    • Opcode ID: f1fbffac40d2f5b9a22a27e05626f995e90a8031b9c195ccb1d099a7aa5650ce
                    • Instruction ID: 619c8841e9367414ccc3063f62ec0a3f9599038514cbf646943067471fcbb0a5
                    • Opcode Fuzzy Hash: f1fbffac40d2f5b9a22a27e05626f995e90a8031b9c195ccb1d099a7aa5650ce
                    • Instruction Fuzzy Hash: A4019E71A0070ADFFB10EF18D880BD637A8F78931DF484569DA059B262C3B5D8908BD8
                    APIs
                    • MessageBoxA.USER32(00000000,00415050,Error,00000000), ref: 0040A50F
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Message
                    • String ID: Error$PPA
                    • API String ID: 2030045667-1706176930
                    • Opcode ID: f1fbffac40d2f5b9a22a27e05626f995e90a8031b9c195ccb1d099a7aa5650ce
                    • Instruction ID: 59db18f171209e0c1d41417ac73f181ac3968abd38ad40fc188e8691419b9c4d
                    • Opcode Fuzzy Hash: f1fbffac40d2f5b9a22a27e05626f995e90a8031b9c195ccb1d099a7aa5650ce
                    • Instruction Fuzzy Hash: E2018070200719DBD700CF18D884BD237A4B78935DF484672E904AB396C3B8DCA58BDD
                    APIs
                    • MessageBoxA.USER32(00000000,00415050,Error,00000000), ref: 01F9994C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Message
                    • String ID: Error$PPA
                    • API String ID: 2030045667-1706176930
                    • Opcode ID: 86ea49f4e57eeb26ad5e7264ad24a00fdba1bfc1a654e8c1eae815d4f7d6a87e
                    • Instruction ID: 1409f1114c2dd8ddb3d90db4a04368ef3ef6c5044ce27f8992e46ae82bd6ea83
                    • Opcode Fuzzy Hash: 86ea49f4e57eeb26ad5e7264ad24a00fdba1bfc1a654e8c1eae815d4f7d6a87e
                    • Instruction Fuzzy Hash: 60D0A770248648DAE710D7505C617CA6FA8978130DF44412EE508EA1D1C3B98494CF9E
                    APIs
                    • MessageBoxA.USER32(00000000,00415050,Error,00000000), ref: 0040A54C
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: Message
                    • String ID: Error$PPA
                    • API String ID: 2030045667-1706176930
                    • Opcode ID: 86ea49f4e57eeb26ad5e7264ad24a00fdba1bfc1a654e8c1eae815d4f7d6a87e
                    • Instruction ID: c248e9d6fdd21f7526041fb32f9ed1ec2c6e35b8471d6156cebba6790eaa0f0d
                    • Opcode Fuzzy Hash: 86ea49f4e57eeb26ad5e7264ad24a00fdba1bfc1a654e8c1eae815d4f7d6a87e
                    • Instruction Fuzzy Hash: B6D0A770148648DAD310C7505C627DA6FA8978130DF44412FF508E61E2C3BC8494CB9E
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0$5$9$gfff
                    • API String ID: 0-3360872114
                    • Opcode ID: 4b76fe6ac91e8a6e9f0ecfaee3e44a874122265a6cda743822ac787b69aa1c73
                    • Instruction ID: 89fa3226ace399c32de9211d40d5a619595ab562bad247d58ad2153882dc0d40
                    • Opcode Fuzzy Hash: 4b76fe6ac91e8a6e9f0ecfaee3e44a874122265a6cda743822ac787b69aa1c73
                    • Instruction Fuzzy Hash: 8FA1C0B1D0025ACFDB11CE68C884BEEBBF5BB49351F648269D504A7341D3BB9A45CBA0
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0$5$9$gfff
                    • API String ID: 0-3360872114
                    • Opcode ID: e7f5bb9b81cef4ffb4ad9844f78d3432ff2e671a925aca702dc4158b9f5023be
                    • Instruction ID: 7536387e810de60f76321832a575b2987067e80d475626a6ba3c6ffe9660e5fc
                    • Opcode Fuzzy Hash: e7f5bb9b81cef4ffb4ad9844f78d3432ff2e671a925aca702dc4158b9f5023be
                    • Instruction Fuzzy Hash: F4A10439E0025A8FDF11CE69D884BEEBBF2FF59314F24416AD804A7341D3399985CB99
                    Strings
                    • DKV, xrefs: 01FBC47E
                    • nvalid memory pool code %d "Unsupported JPEG data precision %d 6Invalid progressive parameters Ss=%d Se=%d Ah=%d Al=%d 6Invalid progressiv, xrefs: 01FBC41D, 01FBC422
                    • hKV, xrefs: 01FBC4A9
                    • 4JV, xrefs: 01FBC414
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: 4JV$DKV$hKV$nvalid memory pool code %d "Unsupported JPEG data precision %d 6Invalid progressive parameters Ss=%d Se=%d Ah=%d Al=%d 6Invalid progressiv
                    • API String ID: 0-2046388181
                    • Opcode ID: bbd5c69d95575d0cb446802bc1574f854733fe4128b4be71e05d333ef3fe2572
                    • Instruction ID: b0b5672d3655f683609c22666479ba092f8c2ef764a81e3b33a7eff503329636
                    • Opcode Fuzzy Hash: bbd5c69d95575d0cb446802bc1574f854733fe4128b4be71e05d333ef3fe2572
                    • Instruction Fuzzy Hash: D5811774A4010EDFDB00EB94D994BDEBBBABF44304F5481A1E444AB264DB76AE46DF40
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0$5$9$gfff
                    • API String ID: 0-3360872114
                    • Opcode ID: 3ad47d036e430c3facd308b33e69a432b1fb6dade9a42aa29328fad8452c0230
                    • Instruction ID: d4f7964d20a89224c8e14a11c3f04cd0e4795f3f26a98e3ec1f1d7307e88cf2d
                    • Opcode Fuzzy Hash: 3ad47d036e430c3facd308b33e69a432b1fb6dade9a42aa29328fad8452c0230
                    • Instruction Fuzzy Hash: 7B5104B1E04259CFCF11CE68C484BEDBBE2BB55345F64416AC404A7341D3BB9A49CB61
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0$5$9$gfff
                    • API String ID: 0-3360872114
                    • Opcode ID: 34a189bb39a0a6bc15899857cac48a7b609f3e700d107807870b0de50febeee1
                    • Instruction ID: 2aa4f61d8b38760beb694458177817fdd55e1cc5ec27c476b640cce714fd9e87
                    • Opcode Fuzzy Hash: 34a189bb39a0a6bc15899857cac48a7b609f3e700d107807870b0de50febeee1
                    • Instruction Fuzzy Hash: 7051E239E0425A8FDF15CEAAD4847EDBBE2AB59304F24016BDC01A7341D37A99C9CB19
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: 0=O$DwX$DwX$hwX
                    • API String ID: 0-2189047185
                    • Opcode ID: bd4049ff42f68e3d2612325f9a7efb41de3d1a678c5725c4f6b928a99e786365
                    • Instruction ID: adf7e59cf35f5744acd172731c16eb28302742867799e60a8c6db6a41a76e594
                    • Opcode Fuzzy Hash: bd4049ff42f68e3d2612325f9a7efb41de3d1a678c5725c4f6b928a99e786365
                    • Instruction Fuzzy Hash: 1F51B374A5120D9BDB00EFA8D890ACEBBF5FF14300F508525E405AB354EB75AA46EF80
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: <7W$L7W$\7W$l7W
                    • API String ID: 0-3196759857
                    • Opcode ID: 1ee66b2b76892536d1b1df35a50acf22416ff3b60a7fb6e201d9011e4c014070
                    • Instruction ID: 30d319f80d830c23e09635f60d524ad8dd0417fb184c9c640eaa0306f780595a
                    • Opcode Fuzzy Hash: 1ee66b2b76892536d1b1df35a50acf22416ff3b60a7fb6e201d9011e4c014070
                    • Instruction Fuzzy Hash: E4317DB4E0020E9FDB00EFE8D990A8DBBF6FF14704F548425E419EB358E775AA099B51
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID:
                    • String ID: $CA$4CA$DCA$DCA
                    • API String ID: 0-337835432
                    • Opcode ID: 53cde01fc08bfff6a18b0c98131430ed1e105dbf6542df39a15a767b3dda0f50
                    • Instruction ID: 3d152aa55002a46b2516e860ca92b0f22d6ba42c72498d41e773bf7cd32022ee
                    • Opcode Fuzzy Hash: 53cde01fc08bfff6a18b0c98131430ed1e105dbf6542df39a15a767b3dda0f50
                    • Instruction Fuzzy Hash: 7C11C5B57001058FEF02EB19F890A9A77B2BBE4344B68C076E9118B274DB36DC01CB98
                    APIs
                    • GetLastError.KERNEL32 ref: 01F97CC8
                    • TlsGetValue.KERNEL32 ref: 01F97CD5
                    • SetLastError.KERNEL32(00000000), ref: 01F97CFD
                      • Part of subcall function 01F97C20: GetLastError.KERNEL32(00000000,?,?,01F97CE5), ref: 01F97C25
                      • Part of subcall function 01F97C20: TlsGetValue.KERNEL32(00000000,?,?,01F97CE5), ref: 01F97C44
                      • Part of subcall function 01F97C20: LocalAlloc.KERNEL32(00000040), ref: 01F97C57
                      • Part of subcall function 01F97C20: TlsSetValue.KERNEL32(00000000,00000040), ref: 01F97C72
                      • Part of subcall function 01F97C20: SetLastError.KERNEL32(00000000), ref: 01F97C78
                    • TlsGetValue.KERNEL32 ref: 01F97CEB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1458269265.0000000001F90000.00000040.00001000.00020000.00000000.sdmp, Offset: 01F90000, based on PE: true
                    • Associated: 00000000.00000002.1458409808.0000000002190000.00000040.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1f90000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLastValue$AllocLocal
                    • String ID:
                    • API String ID: 1904213510-0
                    • Opcode ID: 10c2c58ee1f1c2cc6298a0af3ada34d2c49aae0b1d15a0902be342164778f74c
                    • Instruction ID: 26a3ad0d3d8422415d1e4f1b7c29b4817116031f673e75f36aab0b551157bcd6
                    • Opcode Fuzzy Hash: 10c2c58ee1f1c2cc6298a0af3ada34d2c49aae0b1d15a0902be342164778f74c
                    • Instruction Fuzzy Hash: B5E08C322306176BEF5273BD9C40A9AB69DEFE12E8B400532F644D3220EE63DC0046A4
                    APIs
                    • GetLastError.KERNEL32 ref: 004088C8
                    • TlsGetValue.KERNEL32 ref: 004088D5
                    • SetLastError.KERNEL32(00000000), ref: 004088FD
                      • Part of subcall function 00408820: GetLastError.KERNEL32(00000000,?,?,004088E5), ref: 00408825
                      • Part of subcall function 00408820: TlsGetValue.KERNEL32(00000000,?,?,004088E5), ref: 00408844
                      • Part of subcall function 00408820: LocalAlloc.KERNEL32(00000040), ref: 00408857
                      • Part of subcall function 00408820: TlsSetValue.KERNEL32(00000000,00000040), ref: 00408872
                      • Part of subcall function 00408820: SetLastError.KERNEL32(00000000), ref: 00408878
                    • TlsGetValue.KERNEL32 ref: 004088EB
                    Memory Dump Source
                    • Source File: 00000000.00000002.1457013894.0000000000401000.00000020.00001000.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    • Associated: 00000000.00000002.1456991809.0000000000400000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457041171.0000000000411000.00000004.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457211049.0000000000412000.00000002.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457260737.0000000000414000.00000040.00001000.00020000.00000000.sdmpDownload File
                    • Associated: 00000000.00000002.1457374380.0000000000417000.00000004.00001000.00020000.00000000.sdmpDownload File
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_400000_1iC0WTxgUf.jbxd
                    Similarity
                    • API ID: ErrorLastValue$AllocLocal
                    • String ID:
                    • API String ID: 1904213510-0
                    • Opcode ID: 76411162de9fdefad6ab875f26ce2d046e0d0cdbec429a2848d1d2bcf9871f8d
                    • Instruction ID: a4c879f3bc6ff282489d911efc85a0eca7394b05a79172680eb126068def775c
                    • Opcode Fuzzy Hash: 76411162de9fdefad6ab875f26ce2d046e0d0cdbec429a2848d1d2bcf9871f8d
                    • Instruction Fuzzy Hash: 7AE04F3221051027D60277AA9C4269A6699DB893E8780053BF280B71B2EE3DCC0042AD