Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
90m2xwxCOf.exe

Overview

General Information

Sample name:90m2xwxCOf.exe
renamed because original name is a hash value
Original sample name:3327701929db65a98836f1241b3218ff.exe
Analysis ID:1580927
MD5:3327701929db65a98836f1241b3218ff
SHA1:43e1532366295da9e3729355fddb0c1be60065e0
SHA256:77b74d8f3ad5c7058ac3742324341f17060d89a82b3545bbd357b191e9a2b5ef
Tags:exeuser-abuse_ch
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Tries to detect virtualization through RDTSC time measurements
Contains functionality to query CPU information (cpuid)
Detected potential crypto function
Found potential string decryption / allocating functions
PE file contains an invalid checksum
Program does not show much activity (idle)

Classification

  • System is w10x64
  • 90m2xwxCOf.exe (PID: 1384 cmdline: "C:\Users\user\Desktop\90m2xwxCOf.exe" MD5: 3327701929DB65A98836F1241B3218FF)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 90m2xwxCOf.exeReversingLabs: Detection: 34%
Source: 90m2xwxCOf.exeVirustotal: Detection: 19%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.8% probability
Source: 90m2xwxCOf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162117401_2_00007FF716211740
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162297281_2_00007FF716229728
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162187941_2_00007FF716218794
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716211F601_2_00007FF716211F60
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162010001_2_00007FF716201000
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162098001_2_00007FF716209800
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162218741_2_00007FF716221874
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162208C81_2_00007FF7162208C8
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162240AC1_2_00007FF7162240AC
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162180E41_2_00007FF7162180E4
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716211D541_2_00007FF716211D54
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716215D301_2_00007FF716215D30
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF71621E5701_2_00007FF71621E570
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716249D661_2_00007FF716249D66
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162135A01_2_00007FF7162135A0
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716225E7C1_2_00007FF716225E7C
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716219EA01_2_00007FF716219EA0
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF71621DEF01_2_00007FF71621DEF0
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716211B501_2_00007FF716211B50
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716223C101_2_00007FF716223C10
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716212C101_2_00007FF716212C10
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716225C001_2_00007FF716225C00
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162264181_2_00007FF716226418
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162208C81_2_00007FF7162208C8
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF71620A47B1_2_00007FF71620A47B
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF71620ACAD1_2_00007FF71620ACAD
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162119441_2_00007FF716211944
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162269641_2_00007FF716226964
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162121641_2_00007FF716212164
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162139A41_2_00007FF7162139A4
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF7162089E01_2_00007FF7162089E0
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF71621DA5C1_2_00007FF71621DA5C
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF71620A2DB1_2_00007FF71620A2DB
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_000002A639ECFBD81_2_000002A639ECFBD8
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_000002A639EC3AD81_2_000002A639EC3AD8
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_000002A639ECD9AC1_2_000002A639ECD9AC
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: String function: 00007FF716202710 appears 52 times
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: String function: 00007FF7162EF548 appears 77 times
Source: 90m2xwxCOf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: classification engineClassification label: mal56.evad.winEXE@1/0@0/0
Source: 90m2xwxCOf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 90m2xwxCOf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\90m2xwxCOf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 90m2xwxCOf.exeReversingLabs: Detection: 34%
Source: 90m2xwxCOf.exeVirustotal: Detection: 19%
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\90m2xwxCOf.exeSection loaded: wintypes.dllJump to behavior
Source: 90m2xwxCOf.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: 90m2xwxCOf.exeStatic file information: File size 3273105 > 1048576
Source: 90m2xwxCOf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: 90m2xwxCOf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: 90m2xwxCOf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: 90m2xwxCOf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 90m2xwxCOf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: 90m2xwxCOf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: 90m2xwxCOf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: 90m2xwxCOf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: 90m2xwxCOf.exeStatic PE information: real checksum: 0x712ccf should be: 0x322503
Source: 90m2xwxCOf.exeStatic PE information: section name: .text entropy: 7.308139118973473

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\90m2xwxCOf.exeRDTSC instruction interceptor: First address: 7FF716262B1B second address: 7FF716261D6A instructions: 0x00000000 rdtsc 0x00000002 pushfd 0x00000003 dec eax 0x00000004 add ebp, 01h 0x00000007 popfd 0x00000008 dec eax 0x00000009 lea ebp, dword ptr [ebp-01h] 0x0000000c dec eax 0x0000000d and eax, 00000001h 0x00000012 dec eax 0x00000013 lea ebx, dword ptr [ebx] 0x00000015 dec eax 0x00000016 xchg esi, edx 0x00000018 dec eax 0x00000019 xchg dword ptr [esp], esi 0x0000001c dec eax 0x0000001d xchg esi, edx 0x0000001f dec eax 0x00000020 lea esp, dword ptr [esp+08h] 0x00000024 dec eax 0x00000025 xchg eax, edx 0x00000026 dec eax 0x00000027 xchg dword ptr [esp], edx 0x0000002a dec eax 0x0000002b xchg eax, edx 0x0000002c dec eax 0x0000002d lea esp, dword ptr [esp+08h] 0x00000031 je 00007F64251C6F24h 0x00000037 popfd 0x00000038 push edi 0x00000039 dec eax 0x0000003a mov edi, dword ptr [esp+08h] 0x0000003e dec eax 0x0000003f lea edi, dword ptr [edi+0Eh] 0x00000042 dec eax 0x00000043 xchg dword ptr [esp+08h], edi 0x00000047 dec eax 0x00000048 mov dword ptr [esp+08h], edi 0x0000004c dec eax 0x0000004d mov edi, dword ptr [esp] 0x00000050 dec eax 0x00000051 lea esp, dword ptr [esp+08h] 0x00000055 je 00007F64252743F2h 0x0000005b jne 00007F64252743ECh 0x00000061 jns 00007F6425100938h 0x00000067 pushfd 0x00000068 push esi 0x00000069 dec eax 0x0000006a mov esi, dword ptr [esp+08h] 0x0000006e dec eax 0x0000006f lea esi, dword ptr [esi+3Dh] 0x00000072 dec eax 0x00000073 xchg dword ptr [esp+08h], esi 0x00000077 dec eax 0x00000078 mov dword ptr [esp+08h], esi 0x0000007c dec eax 0x0000007d mov esi, dword ptr [esp] 0x00000080 dec eax 0x00000081 lea esp, dword ptr [esp+08h] 0x00000085 dec eax 0x00000086 xchg eax, ecx 0x00000087 dec eax 0x00000088 lea esp, dword ptr [esp-08h] 0x0000008c dec eax 0x0000008d mov dword ptr [esp], ecx 0x00000090 dec eax 0x00000091 mov ecx, eax 0x00000093 dec eax 0x00000094 mov eax, dword ptr [esp] 0x00000097 dec eax 0x00000098 xchg eax, edx 0x00000099 dec eax 0x0000009a lea esp, dword ptr [esp-08h] 0x0000009e dec eax 0x0000009f mov dword ptr [esp], eax 0x000000a2 dec eax 0x000000a3 mov eax, edx 0x000000a5 dec eax 0x000000a6 mov edx, dword ptr [esp] 0x000000a9 rdtsc
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\90m2xwxCOf.exeCode function: 1_2_00007FF716229570 cpuid 1_2_00007FF716229570
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
2
Software Packing
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Deobfuscate/Decode Files or Information
LSASS Memory111
System Information Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
90m2xwxCOf.exe34%ReversingLabs
90m2xwxCOf.exe20%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0035.t-0009.t-msedge.net
13.107.246.63
truefalse
    high
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1580927
    Start date and time:2024-12-26 13:15:19 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 2m 18s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:2
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:90m2xwxCOf.exe
    renamed because original name is a hash value
    Original Sample Name:3327701929db65a98836f1241b3218ff.exe
    Detection:MAL
    Classification:mal56.evad.winEXE@1/0@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Stop behavior analysis, all processes terminated
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Excluded IPs from analysis (whitelisted): 13.107.246.63
    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    s-part-0035.t-0009.t-msedge.nettFDKSN3TdH.exeGet hashmaliciousLummaCBrowse
    • 13.107.246.63
    V2s8yjvIJw.exeGet hashmaliciousIris StealerBrowse
    • 13.107.246.63
    z3IxCpcpg4.exeGet hashmaliciousLummaCBrowse
    • 13.107.246.63
    GtEVo1eO2p.exeGet hashmaliciousLummaCBrowse
    • 13.107.246.63
    E6rBvcWFWu.exeGet hashmaliciousUnknownBrowse
    • 13.107.246.63
    k6olCJyvIj.exeGet hashmaliciousLummaCBrowse
    • 13.107.246.63
    BeoHXxE7q3.exeGet hashmaliciousLummaCBrowse
    • 13.107.246.63
    4KDKJjRzm8.exeGet hashmaliciousLummaCBrowse
    • 13.107.246.63
    9InQHaM8hT.exeGet hashmaliciousStealcBrowse
    • 13.107.246.63
    b0ho5YYSdo.exeGet hashmaliciousLummaCBrowse
    • 13.107.246.63
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64, for MS Windows
    Entropy (8bit):7.7226336070570945
    TrID:
    • Win64 Executable GUI (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:90m2xwxCOf.exe
    File size:3'273'105 bytes
    MD5:3327701929db65a98836f1241b3218ff
    SHA1:43e1532366295da9e3729355fddb0c1be60065e0
    SHA256:77b74d8f3ad5c7058ac3742324341f17060d89a82b3545bbd357b191e9a2b5ef
    SHA512:196f74c100bdfbe24554599c868f4eb0ff8681fec597bd50ad2c3e77b12d70709b4fa112ed9dd64f2287ea28a900271ecd83cc298d3a087bdbcf57c81f3861eb
    SSDEEP:49152:QF1Vrv/5gYZ5rS1dexg5qJYaAQTG35GqgRZBtS6keBp4TfnPSjkU:QFrxgYZ5rEuvJJDIGfLkmSvajh
    TLSH:99E5AEC931D51079C36EC3BE8D11356E7B203BD25228A74628D94E41BB336BEA93DB35
    File Content Preview:MZ......................@...............SENS............................!..L.!This program cannot be run in DOS mode....$...........Zpc.Zpc.Zpc...`.]pc...f..pc...g.Ppc.....Ypc...`.Spc...g.Kpc...f.rpc...b.Qpc.Zpb..pc.O.g.Cpc.O.a.[pc.RichZpc.........PE..d..
    Icon Hash:0f3391d999f17117
    Entrypoint:0x140117898
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x66C6DF60 [Thu Aug 22 06:49:04 2024 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:d21e351310836af6b870c53243cea736
    Instruction
    jmp 00007F6424ABAE28h
    push ebp
    push ebx
    jnle 00007F6424AFEF89h
    xor bh, byte ptr [ecx-17h]
    aas
    les esi, esp
    jmp far fword ptr [esi+20h]
    push ebp
    retn FAADh
    push esp
    call 00007F6424AE0278h
    push ecx
    dec eax
    mov eax, 0003F6B4h
    add byte ptr [eax], al
    add byte ptr [eax], al
    call 00007F6424B30C80h
    call 00007F6424B05FBBh
    or eax, BA3BBD16h
    aaa
    test eax, E54A30A3h
    mov cl, A8h
    inc edi
    add dword ptr [esp+ecx], ebx
    add byte ptr [esp], bl
    or al, 00h
    sbb al, 54h
    or eax, dword ptr [eax]
    sbb al, 34h
    or al, byte ptr [eax]
    sbb al, 32h
    sbb al, dh
    push ss
    loopne 00007F6424AFEF26h
    rcl byte ptr [edx], 1
    rcl byte ptr [eax], 00000070h
    add byte ptr [eax], al
    add byte ptr [eax], al
    pushfd
    pushfd
    dec eax
    add ebp, 13h
    popfd
    dec eax
    lea ebp, dword ptr [ebp-13h]
    call 00007F6424AFEF15h
    push edx
    dec eax
    mov edx, dword ptr [esp+04h]
    pop edx
    dec eax
    add dword ptr [esp+00h], FFFC32EDh
    dec eax
    xchg dword ptr [esp+00h], ebx
    dec eax
    mov eax, eax
    dec eax
    xchg dword ptr [esp+08h], ebx
    push esi
    dec eax
    mov esi, dword ptr [esp+08h]
    dec eax
    lea esi, dword ptr [esi+7Dh]
    dec eax
    xchg dword ptr [esp+08h], esi
    dec eax
    mov dword ptr [esp+08h], esi
    dec eax
    mov esi, dword ptr [esp]
    dec eax
    lea esp, dword ptr [esp+08h]
    dec eax
    xchg dword ptr [esp+00h], ebx
    pushfd
    dec eax
    add ebp, 1Dh
    popfd
    dec eax
    lea ebp, dword ptr [ebp-1Dh]
    popfd
    push esi
    dec eax
    mov esi, ebx
    pop esi
    jmp 00007F6424AC21AEh
    adc ecx, ebx
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1547a80x78.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1600000x10e34.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x440000x2250.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x15f0000xd98.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x3a0800x1c.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x39f400x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x4a0.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x29f000x2a0009b3176f739b33206e45a84d232c8adcdFalse0.5520193917410714data6.499379146650062IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x2b0000x12a500x12c003f1a1721d605a8cee94b0556584d2fd9False0.5018489583333333data5.54333127102241IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x3e0000x53f80xe00dba0caeecab624a0ccc0d577241601d1False0.134765625data1.8392217063172436IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x440000x22500x2400181312260a85d10a1454ba38901c499bFalse0.4705946180555556data5.290347578351011IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x470000x110000x11000e033defec470b9ce6e057b3370ac2783False0.07585592830882353data3.3250246885737624IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .text0x580000xfc9080xfca00feab23da9e95e73b1f452c540ba7a962False0.7092163146338446data7.308139118973473IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x1550000x9a680x9c00696954a151a7ad2d9ca86207ed0ed038False0.23337339743589744data4.037993337931208IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .reloc0x15f0000xd980xe0013a7b84aa3f34bea42b74ed5c20291cdFalse0.572265625data5.620738830469574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    .rsrc0x1600000x10e340x11000f766e7fc8f58c288eb777d0451fc1d79False0.075927734375data3.261933371506805IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x1600680x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.06589376552703183
    RT_GROUP_ICON0x1708d00x14data1.15
    RT_MANIFEST0x1709240x50dXML 1.0 document, ASCII text0.4694508894044857
    DLLImport
    GDI32.dllCreateFontIndirectW
    ADVAPI32.dllConvertSidToStringSidW
    KERNEL32.dllFlsGetValue
    COMCTL32.dll
    USER32.dllSendMessageW
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Dec 26, 2024 13:16:08.164377928 CET1.1.1.1192.168.2.90x8fbeNo error (0)shed.dual-low.s-part-0035.t-0009.t-msedge.nets-part-0035.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
    Dec 26, 2024 13:16:08.164377928 CET1.1.1.1192.168.2.90x8fbeNo error (0)s-part-0035.t-0009.t-msedge.net13.107.246.63A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Target ID:1
    Start time:07:16:11
    Start date:26/12/2024
    Path:C:\Users\user\Desktop\90m2xwxCOf.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\90m2xwxCOf.exe"
    Imagebase:0x7ff716200000
    File size:3'273'105 bytes
    MD5 hash:3327701929DB65A98836F1241B3218FF
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.6%
      Dynamic/Decrypted Code Coverage:68.8%
      Signature Coverage:0%
      Total number of Nodes:16
      Total number of Limit Nodes:1

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1397741841.000002A639EC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002A639EC1000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2a639ec1000_90m2xwxCOf.jbxd
      Similarity
      • API ID: Message
      • String ID: N
      • API String ID: 2030045667-1130791706
      • Opcode ID: c1a520171089c764a1bf883e299eb6064c341f4b9d475d0fc402adb0e6589623
      • Instruction ID: 8a198ac8c414f790276df306a77fa0c14dc1315a726f07f8303cbfeb041068d4
      • Opcode Fuzzy Hash: c1a520171089c764a1bf883e299eb6064c341f4b9d475d0fc402adb0e6589623
      • Instruction Fuzzy Hash: 3B513935608B848FE754DB28C458BAABBE1FF99305F444A6EE4CAD3261DB38D541CF06

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1397741841.000002A639EC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002A639EC1000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2a639ec1000_90m2xwxCOf.jbxd
      Similarity
      • API ID: ExitProcess
      • String ID:
      • API String ID: 621844428-0
      • Opcode ID: 4ef83a503b000693640d6e8f7b2307ed38ce45d25f5a8b0d95bc93309ba74388
      • Instruction ID: 1a7f4571c5736a07b551602da081e78f4964c68625d41ce5e8141dc17a5649e7
      • Opcode Fuzzy Hash: 4ef83a503b000693640d6e8f7b2307ed38ce45d25f5a8b0d95bc93309ba74388
      • Instruction Fuzzy Hash: 2BE0123074424C8BEA68A7749CADBAD3A96FF45351F044868E946D73A6CE39D8458F02

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 515 7ff716201000-7ff716203806 call 7ff71620fe18 call 7ff71620fe20 call 7ff71620c850 call 7ff7162153f0 call 7ff716215484 call 7ff7162036b0 529 7ff716203814-7ff716203836 call 7ff716201950 515->529 530 7ff716203808-7ff71620380f 515->530 536 7ff71620383c-7ff716203856 call 7ff716201c80 529->536 537 7ff71620391b-7ff716203931 call 7ff7162045c0 529->537 531 7ff716203c97-7ff716203cb2 call 7ff71620c550 530->531 541 7ff71620385b-7ff71620389b call 7ff716208830 536->541 543 7ff716203933-7ff716203960 call 7ff716207f90 537->543 544 7ff71620396a-7ff71620397f call 7ff716202710 537->544 548 7ff7162038c1-7ff7162038cc call 7ff716214f30 541->548 549 7ff71620389d-7ff7162038a3 541->549 555 7ff716203984-7ff7162039a6 call 7ff716201c80 543->555 556 7ff716203962-7ff716203965 call 7ff71621004c 543->556 557 7ff716203c8f 544->557 564 7ff7162038d2-7ff7162038e1 call 7ff716208830 548->564 565 7ff7162039fc-7ff716203a2a call 7ff716208940 call 7ff7162089a0 * 3 548->565 552 7ff7162038a5-7ff7162038ad 549->552 553 7ff7162038af-7ff7162038bd call 7ff7162089a0 549->553 552->553 553->548 566 7ff7162039b0-7ff7162039b9 555->566 556->544 557->531 573 7ff7162039f4-7ff7162039f7 call 7ff716214f30 564->573 574 7ff7162038e7-7ff7162038ed 564->574 590 7ff716203a2f-7ff716203a3e call 7ff716208830 565->590 566->566 569 7ff7162039bb-7ff7162039d8 call 7ff716201950 566->569 569->541 581 7ff7162039de-7ff7162039ef call 7ff716202710 569->581 573->565 578 7ff7162038f0-7ff7162038fc 574->578 582 7ff716203905-7ff716203908 578->582 583 7ff7162038fe-7ff716203903 578->583 581->557 582->573 585 7ff71620390e-7ff716203916 call 7ff716214f30 582->585 583->578 583->582 585->590 594 7ff716203b45-7ff716203b53 590->594 595 7ff716203a44-7ff716203a47 590->595 596 7ff716203b59-7ff716203b5d 594->596 597 7ff716203a67 594->597 595->594 598 7ff716203a4d-7ff716203a50 595->598 599 7ff716203a6b-7ff716203a90 call 7ff716214f30 596->599 597->599 600 7ff716203a56-7ff716203a5a 598->600 601 7ff716203b14-7ff716203b17 598->601 610 7ff716203a92-7ff716203aa6 call 7ff716208940 599->610 611 7ff716203aab-7ff716203ac0 599->611 600->601 602 7ff716203a60 600->602 603 7ff716203b2f-7ff716203b40 call 7ff716202710 601->603 604 7ff716203b19-7ff716203b1d 601->604 602->597 614 7ff716203c7f-7ff716203c87 603->614 604->603 606 7ff716203b1f-7ff716203b2a 604->606 606->599 610->611 612 7ff716203ac6-7ff716203aca 611->612 613 7ff716203be8-7ff716203bfa call 7ff716208830 611->613 617 7ff716203ad0-7ff716203ae8 call 7ff716215250 612->617 618 7ff716203bcd-7ff716203be2 call 7ff716201940 612->618 622 7ff716203c2e 613->622 623 7ff716203bfc-7ff716203c02 613->623 614->557 628 7ff716203b62-7ff716203b7a call 7ff716215250 617->628 629 7ff716203aea-7ff716203b02 call 7ff716215250 617->629 618->612 618->613 630 7ff716203c31-7ff716203c40 call 7ff716214f30 622->630 626 7ff716203c04-7ff716203c1c 623->626 627 7ff716203c1e-7ff716203c2c 623->627 626->630 627->630 637 7ff716203b7c-7ff716203b80 628->637 638 7ff716203b87-7ff716203b9f call 7ff716215250 628->638 629->618 639 7ff716203b08-7ff716203b0f 629->639 640 7ff716203c46-7ff716203c4a 630->640 641 7ff716203d41-7ff716203d63 call 7ff7162044e0 630->641 637->638 650 7ff716203ba1-7ff716203ba5 638->650 651 7ff716203bac-7ff716203bc4 call 7ff716215250 638->651 639->618 643 7ff716203cd4-7ff716203ce6 call 7ff716208830 640->643 644 7ff716203c50-7ff716203c5f call 7ff7162090e0 640->644 654 7ff716203d65-7ff716203d6f call 7ff716204630 641->654 655 7ff716203d71-7ff716203d82 call 7ff716201c80 641->655 661 7ff716203d35-7ff716203d3c 643->661 662 7ff716203ce8-7ff716203ceb 643->662 659 7ff716203cb3-7ff716203cbd call 7ff716208660 644->659 660 7ff716203c61 644->660 650->651 651->618 674 7ff716203bc6 651->674 665 7ff716203d87-7ff716203d96 654->665 655->665 678 7ff716203cbf-7ff716203cc6 659->678 679 7ff716203cc8-7ff716203ccf 659->679 668 7ff716203c68 call 7ff716202710 660->668 661->668 662->661 663 7ff716203ced-7ff716203d10 call 7ff716201c80 662->663 681 7ff716203d12-7ff716203d26 call 7ff716202710 call 7ff716214f30 663->681 682 7ff716203d2b-7ff716203d33 call 7ff716214f30 663->682 671 7ff716203dbc-7ff716203dd2 call 7ff716209390 665->671 672 7ff716203d98-7ff716203d9f 665->672 675 7ff716203c6d-7ff716203c77 668->675 688 7ff716203dd4 671->688 689 7ff716203de0-7ff716203dfc call 7ff7162f77d0 671->689 672->671 677 7ff716203da1-7ff716203da5 672->677 674->618 675->614 677->671 683 7ff716203da7-7ff716203dbb call 7ff716344508 677->683 678->668 679->665 681->675 682->665 683->671 688->689 696 7ff716203e02-7ff716203e11 call 7ff716208830 689->696 697 7ff716203ef9-7ff716203f00 689->697 706 7ff716203e13-7ff716203e19 696->706 707 7ff716203e2a-7ff716203e34 call 7ff716214f30 696->707 700 7ff716203f06-7ff716203f0d 697->700 701 7ff716204000-7ff716204008 697->701 700->701 705 7ff716203f13-7ff716203f1d call 7ff7162033c0 700->705 703 7ff71620402d-7ff71620405f call 7ff7162036a0 call 7ff716203360 call 7ff716203670 call 7ff716206fc0 call 7ff716206d70 701->703 704 7ff71620400a-7ff71620402c call 7ff716267308 call 7ff71631f420 701->704 704->703 705->675 717 7ff716203f23-7ff716203f37 call 7ff7162090c0 705->717 712 7ff716203e25-7ff716203e27 706->712 713 7ff716203e1b-7ff716203e23 706->713 723 7ff716203eea-7ff716203ef4 call 7ff716208940 707->723 724 7ff716203e3a-7ff716203e40 707->724 712->707 713->712 731 7ff716203f5c-7ff716203f9f call 7ff716208940 call 7ff7162089e0 call 7ff716206fc0 call 7ff716206d70 call 7ff7162088e0 717->731 732 7ff716203f39-7ff716203f5b call 7ff716267308 call 7ff71631f420 717->732 723->697 724->723 728 7ff716203e46-7ff716203e4c 724->728 733 7ff716203e4e-7ff716203e50 728->733 734 7ff716203e57-7ff716203e59 728->734 775 7ff716203fa1-7ff716203fb7 call 7ff716208ed0 call 7ff7162088e0 731->775 776 7ff716203fed-7ff716203ffb call 7ff716201900 731->776 732->731 735 7ff716203e5f-7ff716203e7b call 7ff716206dc0 call 7ff716207340 733->735 739 7ff716203e52 733->739 734->697 734->735 754 7ff716203e86-7ff716203e8d 735->754 755 7ff716203e7d-7ff716203e84 735->755 739->697 759 7ff716203e8f-7ff716203e9c call 7ff716206e00 754->759 760 7ff716203ea7-7ff716203eb1 call 7ff7162071b0 754->760 758 7ff716203ed3-7ff716203ee8 call 7ff716202a50 call 7ff716206fc0 call 7ff716206d70 755->758 758->697 759->760 771 7ff716203e9e-7ff716203ea5 759->771 772 7ff716203eb3-7ff716203eba 760->772 773 7ff716203ebc-7ff716203eca call 7ff7162074f0 760->773 771->758 772->758 773->697 782 7ff716203ecc 773->782 775->776 788 7ff716203fb9-7ff716203fce 775->788 776->675 782->758 789 7ff716203fd0-7ff716203fe3 call 7ff716202710 call 7ff716201900 788->789 790 7ff716203fe8 call 7ff716202a50 788->790 789->675 790->776
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to load splash screen resources!$Failed to remove temporary directory: %s$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$Invalid value in _PYI_PARENT_PROCESS_LEVEL: %s$MEI$PYINSTALLER_RESET_ENVIRONMENT$PYINSTALLER_STRICT_UNPACK_MODE$PYINSTALLER_SUPPRESS_SPLASH_SCREEN$Path exceeds PYI_PATH_MAX limit.$Py_GIL_DISABLED$VCRUNTIME140.dll$_PYI_APPLICATION_HOME_DIR$_PYI_APPLICATION_HOME_DIR not set for onefile child process!$_PYI_ARCHIVE_FILE$_PYI_PARENT_PROCESS_LEVEL$_PYI_SPLASH_IPC$pkg$pyi-contents-directory$pyi-disable-windowed-traceback$pyi-python-flag$pyi-runtime-tmpdir
      • API String ID: 0-4232158417
      • Opcode ID: f5774766a75c864224054ee403c32c156fcc5e29a78fa51771fbd3df4c043d0d
      • Instruction ID: b8ac593fa3a83f147e11086fb28598096905daf0a14e2775271fff459e3386f1
      • Opcode Fuzzy Hash: f5774766a75c864224054ee403c32c156fcc5e29a78fa51771fbd3df4c043d0d
      • Instruction Fuzzy Hash: 5D328A61A0CE8391FA29FB259C553FBA2A1AF457A4FC44036DA4D436D6EF2CE55CC320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
      • API String ID: 808467561-2761157908
      • Opcode ID: 274013df7cd615f3446597befe559c8a5fa80bc1e0456f2fc32aadd6811bd1ac
      • Instruction ID: d8b7247a1e86a377cd794ec1176c5af1cabed5e18ed25f1c09f1673a61dd0baf
      • Opcode Fuzzy Hash: 274013df7cd615f3446597befe559c8a5fa80bc1e0456f2fc32aadd6811bd1ac
      • Instruction Fuzzy Hash: 14B2F972E19A824BE724DF64DD407FEB7B2FB54398F805139DA0D57A84DB38A908CB50
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
      • API String ID: 0-2665694366
      • Opcode ID: 14409f6b5173d9f28888b9fb9c68bcc2b54b8e7def706e6c40ef53002486e1ba
      • Instruction ID: db5e723c99d4e07e0b56497c422d614a625ec97f5cfe15a8c6b806d29c5b9f5d
      • Opcode Fuzzy Hash: 14409f6b5173d9f28888b9fb9c68bcc2b54b8e7def706e6c40ef53002486e1ba
      • Instruction Fuzzy Hash: 4D521872A14AA647D7A4AF14C858B7F7BE9FB44351F814139EA4A877C0DB3DD848CB10
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo
      • String ID:
      • API String ID: 1286766494-0
      • Opcode ID: 01c2eb1307ee358dd51d4cfaa153f6bd8fa3820bf955cab56f0a87d0391dd347
      • Instruction ID: 03b0fcbed3b4b951642dcbc8576d80952ee77c284a9bc6563e67637211f5e7b0
      • Opcode Fuzzy Hash: 01c2eb1307ee358dd51d4cfaa153f6bd8fa3820bf955cab56f0a87d0391dd347
      • Instruction Fuzzy Hash: 9ED1B236A08A5246E720FF22DC411BBA752EF847A4FC48139EE0E57A95DF3CE449C760
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: CreateProcessW$Failed to create child process!$PyInstaller Onefile Hidden Window$PyInstallerOnefileHiddenWindow
      • API String ID: 3215553584-3165540532
      • Opcode ID: 112b2cf12cdc3a191c93ca37d30556e7707750e3094662ff9bdd8f0d8ca4d711
      • Instruction ID: a33c0bd47e56de4ef9e4398a25f63af5954377f8bfc391b4799e95b104eb555a
      • Opcode Fuzzy Hash: 112b2cf12cdc3a191c93ca37d30556e7707750e3094662ff9bdd8f0d8ca4d711
      • Instruction Fuzzy Hash: 42C1B032A09E8245EB10BB349C516FFA7A4FF85768F901239EA5D53AD6DF3CD5088720
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: memcpy_s
      • String ID:
      • API String ID: 1502251526-0
      • Opcode ID: ee79868302b1c941275c0cce9f489ce6055043019d07640c6735408ca62a73bb
      • Instruction ID: 6a226992e89a0b7e75ac3ca7c304d6dc82f626a559d59b441f97bc821bc1a242
      • Opcode Fuzzy Hash: ee79868302b1c941275c0cce9f489ce6055043019d07640c6735408ca62a73bb
      • Instruction Fuzzy Hash: 87C12572B19A8687D734DF15E44466BF7A2FB94B94F808138DB4A43784CB3DE949CB40
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _get_daylight_invalid_parameter_noinfo
      • String ID:
      • API String ID: 474895018-0
      • Opcode ID: f407c6c1e9b5c4be2678f094eab68ade84efea367f281159f9e28505f81f694a
      • Instruction ID: b5ee01ddca3740813fce2694ea6c180218bc5331594f1039325f4cf698eaabda
      • Opcode Fuzzy Hash: f407c6c1e9b5c4be2678f094eab68ade84efea367f281159f9e28505f81f694a
      • Instruction Fuzzy Hash: 31514432A08E4246E720FF22DC815BBE761BF487A4FC08139EA4D57A95DF3CE4498760
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: $header crc mismatch$unknown header flags set
      • API String ID: 0-1127688429
      • Opcode ID: e32b299fc273864699ec3bddfbf8fc958dab4a7742ffdf8f0166f3b43fcc42d1
      • Instruction ID: c2c1032cd6241a3583a4be037f2153885dc8d585c7fff17f04b6cdc709f00c27
      • Opcode Fuzzy Hash: e32b299fc273864699ec3bddfbf8fc958dab4a7742ffdf8f0166f3b43fcc42d1
      • Instruction Fuzzy Hash: E5F19272A18BC94BE7A5BF188888A3FBAA9FF44750F854238DE4947791CB38D448C750
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: $
      • API String ID: 0-227171996
      • Opcode ID: e57f1980f4491aea9eb328a1e81193c2bccc9a7e68d1918bb9b7207cf9600634
      • Instruction ID: eb38383f70a52235d770c7e37099dfd8d93f1184fd8e8b4800f78a999e739980
      • Opcode Fuzzy Hash: e57f1980f4491aea9eb328a1e81193c2bccc9a7e68d1918bb9b7207cf9600634
      • Instruction Fuzzy Hash: D6E1E6B2A0CE4681EB68AF258C5013FB3A2FF45B68FA44135CA4E077D4DF29E849C350
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: incorrect header check$invalid window size
      • API String ID: 0-900081337
      • Opcode ID: e8ec78490181e4ccec650f854842bb3e08bcfae3bf2db5596c2af0d8e2ff5899
      • Instruction ID: 2e54da71d5667565fa0aa0b3e93b187822b77e105ddcf4cb9d687b2ca1b207e3
      • Opcode Fuzzy Hash: e8ec78490181e4ccec650f854842bb3e08bcfae3bf2db5596c2af0d8e2ff5899
      • Instruction Fuzzy Hash: A291DD72A186C987E7B4BF15C848B7F7AA9FF44360F818239DA4A467C1CB39E544CB10
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: e+000$gfff
      • API String ID: 0-3030954782
      • Opcode ID: c8a24eaff8c968987b4d031b15ae93849e98bcf9eddb8930961e84febef9b5bc
      • Instruction ID: fe44b45530944f5f986ff39bef15540ea59de9537af4c409a81b11e9d7360d46
      • Opcode Fuzzy Hash: c8a24eaff8c968987b4d031b15ae93849e98bcf9eddb8930961e84febef9b5bc
      • Instruction Fuzzy Hash: 225168A3B1CAC586E7259E359C0176AEB91F744BA4F888631CBAC4BAC5CE3DD1488710
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1397741841.000002A639EC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002A639EC1000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2a639ec1000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _clrfp
      • String ID:
      • API String ID: 3618594692-0
      • Opcode ID: 57c0aad7674539f30f3b5eb1b32e0dbdf3af3d9e6d373f3973137eb903cdae01
      • Instruction ID: 3bc7a009f94152259ad754013c3072665160795cb6c79b2bec17f1123886bf0d
      • Opcode Fuzzy Hash: 57c0aad7674539f30f3b5eb1b32e0dbdf3af3d9e6d373f3973137eb903cdae01
      • Instruction Fuzzy Hash: 3BC15D31A10A4D8FEBA8CF1CC49AB557BE0FF4A314F194999E899CB2A5C735D852CF01
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: b1e464fc850b8064c24b6b861928ec408d4c1656d056e3a04d07bd96ab05ec55
      • Instruction ID: ea5c3ec703fe4932fd00aa6c401d4c4f6b7c08cdc936b4a426d3bb216925957b
      • Opcode Fuzzy Hash: b1e464fc850b8064c24b6b861928ec408d4c1656d056e3a04d07bd96ab05ec55
      • Instruction Fuzzy Hash: F6A1F866B18A8241EA61BB219D049BBE3A2EB44BF1FA45135EF4D07BC5DE3CE449C310
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _clrfp
      • String ID:
      • API String ID: 3618594692-0
      • Opcode ID: 10bdc0aef22281e2c3bf2c24ae13a449422a775620643f1596252de5feb350ab
      • Instruction ID: 4bb343688a525c9c247d2d4504895a29614c8e6713297e1ea8e4bc133391bb8d
      • Opcode Fuzzy Hash: 10bdc0aef22281e2c3bf2c24ae13a449422a775620643f1596252de5feb350ab
      • Instruction Fuzzy Hash: 26B19E73A00B898BEB15CF2AC84636D7BE1F744B98F588825DB5D837A4CB39D455C710
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1397741841.000002A639EC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002A639EC1000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2a639ec1000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: 0
      • API String ID: 3215553584-4108050209
      • Opcode ID: 7795948cfd765bef9381294a4e1b829f89c49aa63f3f1a464909e031b2790c9f
      • Instruction ID: 031b1e840dafcf5d0c2b3551366eeb8c02481623a72120665ef8f8f32cec22d4
      • Opcode Fuzzy Hash: 7795948cfd765bef9381294a4e1b829f89c49aa63f3f1a464909e031b2790c9f
      • Instruction Fuzzy Hash: AD71A316B186454BEEB89A1C44AD3E96BC2EF57B04F6C3199ECC6872C6CF118C078E57
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: gfffffff
      • API String ID: 0-1523873471
      • Opcode ID: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
      • Instruction ID: 94d7e46a28990561d892b7f6d0971a65e369a7088435c8c9b2c37d46d684a999
      • Opcode Fuzzy Hash: bcab6200947a377332474fa44b4677218d40dcace4b26705986274372b0e4f91
      • Instruction Fuzzy Hash: CEA157A3A0CBC986EB21EF25AC007ABB791AB51BA4F448431DE4D477C5DE3DE509C710
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: TMP
      • API String ID: 3215553584-3125297090
      • Opcode ID: 405b9769b8a986946faf73e500ffb4ce1780379e6f9b934ce1cdce4b063a5bb7
      • Instruction ID: 2849c2eb0fb66d505edcc05f9dd3d39330dfe93f30eaada105087947576b7920
      • Opcode Fuzzy Hash: 405b9769b8a986946faf73e500ffb4ce1780379e6f9b934ce1cdce4b063a5bb7
      • Instruction Fuzzy Hash: F451DF85F0CE0642FA64BA265D9157BD291AF45BF4FDA8034DE0E477C6EE7CE44A8220
      Memory Dump Source
      • Source File: 00000001.00000002.1397741841.000002A639EC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002A639EC1000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2a639ec1000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 724baf72195310b1dc216f7aa84dc3b548b0c8b89f03789b1ede33962e9eb6f3
      • Instruction ID: 52b4829765efc75cbb76fc48e45e48ea9113500fd95fb3dd6086e06feefda6f8
      • Opcode Fuzzy Hash: 724baf72195310b1dc216f7aa84dc3b548b0c8b89f03789b1ede33962e9eb6f3
      • Instruction Fuzzy Hash: AAF10632A08A4C4BDB29DF98C8987E9BBE1EF95710F1842AED886C7151DF31D5478F81
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 595334a42f08af57c0a06d01f3192a900b6e8ba0f9f897347145e7bfe280db29
      • Instruction ID: 966cf8a81433e8943ef73e2b74f64d4063a7eb7926612e1b896f026cd291278e
      • Opcode Fuzzy Hash: 595334a42f08af57c0a06d01f3192a900b6e8ba0f9f897347145e7bfe280db29
      • Instruction Fuzzy Hash: 6002B061A1EE4641FA65BB129C1027BE683BF41BB0FD58638ED6D4A3D1DE3DA449C330
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6953e196ddb05ff7f74cd889691ab2d661dc7abd12c14b9ae78539541f5d55fd
      • Instruction ID: 39766610fa5feb9a6e3faeed6c82d765fd765e5fa0102418a0e9977e63ed1022
      • Opcode Fuzzy Hash: 6953e196ddb05ff7f74cd889691ab2d661dc7abd12c14b9ae78539541f5d55fd
      • Instruction Fuzzy Hash: 59D1E8A2A0CE4786EB28AF258C5023FA792AF45B68F954235CE0D477D5CF39D849C760
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f585d0828744060ce3ac2c29acc9446c2d71e0c438b7a0c7fc404ffa74e15ff0
      • Instruction ID: b7a6dce2e203d2102ecb5e8237abcb755822d44bcfaddc82e10e19d34c0d54a1
      • Opcode Fuzzy Hash: f585d0828744060ce3ac2c29acc9446c2d71e0c438b7a0c7fc404ffa74e15ff0
      • Instruction Fuzzy Hash: 9EC1AD766181E08BD28AEB29E86947A73E1F78930DBD5406BEF87477C5C73CA414DB20
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: e94f908cfc2f44f0ebd5e3e636be20b3a38a3e858241def26ac47fd63ac7c98a
      • Instruction ID: 06addfca287b5e002e98fb1419a2010b43b33b9b6e116ac6ebb15ff15e31f8e8
      • Opcode Fuzzy Hash: e94f908cfc2f44f0ebd5e3e636be20b3a38a3e858241def26ac47fd63ac7c98a
      • Instruction Fuzzy Hash: 04C10533B29E5186EB20EF64C8806AE7762E749BA8F915239DE1E573D5CF38D019C310
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: aa73bfa000bc8cd66a05f12d530b76a597660d7bda6a6781f52cf2f49ffced0b
      • Instruction ID: 81cf0c9664222fe17991abf61558ea5404566c06ca688ee13abd2dccd46bb20a
      • Opcode Fuzzy Hash: aa73bfa000bc8cd66a05f12d530b76a597660d7bda6a6781f52cf2f49ffced0b
      • Instruction Fuzzy Hash: A6B1B0F250DB4585E7649F39CC4023EBBA0EB4AB58FA48135EA4E47395CF39E485C760
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9611c2e0762efa78d7f6da3d8515592aa8d86601c49200b7335873453b670326
      • Instruction ID: 32f7dcbbadb8ebbf5a8a72abd7b7163f8d1ca05a51c91ed80ed8dc82b34bc08c
      • Opcode Fuzzy Hash: 9611c2e0762efa78d7f6da3d8515592aa8d86601c49200b7335873453b670326
      • Instruction Fuzzy Hash: 6A81D3B2A0CB8286E774EB199C4037BAA91FB457A4F904235DBDD47B95DE3CE4488B10
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID:
      • API String ID: 3215553584-0
      • Opcode ID: c638a679969e01e5b94e7dfefc78eaeeaf1a73f6c60bc93d488d721839fa988c
      • Instruction ID: 7b2bc746406dd55c32b9848ca010e9598288f3cc676fb69506e88c3a8a6f9bdc
      • Opcode Fuzzy Hash: c638a679969e01e5b94e7dfefc78eaeeaf1a73f6c60bc93d488d721839fa988c
      • Instruction Fuzzy Hash: A161E663E0CA6247F774AA689C5063FE682AF40770FD4423DE65D43AC5DE6DE848C720
      Memory Dump Source
      • Source File: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1cf341ecbc00ded8be85b9825063baed7e6207ccbfb6003808ff7d57c928fbef
      • Instruction ID: 8007d94f9e5145fb9093d386afadb05b2b6e4aa25c95249ca556708fe14773e3
      • Opcode Fuzzy Hash: 1cf341ecbc00ded8be85b9825063baed7e6207ccbfb6003808ff7d57c928fbef
      • Instruction Fuzzy Hash: E14102A2506F43EA6A00677945185CD73969E0BB9DB461061DB862C008AF2188576121
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction ID: febb6e8932d9aa36635f297f317bae53b0b02968f55cbbd2ab281112b74b06c3
      • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
      • Instruction Fuzzy Hash: 0F5190B6A1CE5182EB249B29CC4822AB3A0EB45B79F744131DE4D07BD4CB3AE857C750
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction ID: c2802a3017c235b8eb1b9cfe76b890a699f54fb225072941b00fc6c54488566a
      • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
      • Instruction Fuzzy Hash: 8E51A7B6A1CE5181E7249B29CC5833AB7A0EB44B79F748131CE8D17794CB3AE84BC750
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction ID: 5f2e8daf2cc865673944ae7e2a0a5a3b9dd9401cacbb8907ebf15f204b2174c2
      • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
      • Instruction Fuzzy Hash: 6351B7F6A1DE5185E7249B28CC4027E73A1EB56B78F648131DE4C07795CB3AE887C750
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
      • Instruction ID: a8054fe63cafac4e5951cde2e4d2e32ba866a0c075f930ac60a12807d8cdafdc
      • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
      • Instruction Fuzzy Hash: 3451C7B6A1CE5186E7249B29CC4823AB7A1EB45BB9F748131CE4C07794CF3AE847C750
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
      • Instruction ID: b1de90b779f66fdd54b65a630a0e7365d8e4c575011a0691bd33c37d742ce6bc
      • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
      • Instruction Fuzzy Hash: 335103B6A1DE5182E7249B29CC4433AB3A0EB55B68F748131DE4C073A5CB3AE887C750
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
      • Instruction ID: da5316d3367f39ba46dde27b6262e416d1504b4418a9faa43f6c575e315be1a9
      • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
      • Instruction Fuzzy Hash: BC51BFB6A1CE5182E7249F28CC4833AA7A0EB45B69FB44131CE4C07794DB3AE947C750
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
      • Instruction ID: b1197c22a00629b5bc0f1c6f16faf529d3617fb23cce7d7cae816d91365d6371
      • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
      • Instruction Fuzzy Hash: DE4160E2C0DF4E05E9A999184D086B6A6809F12BB0DDC52F8DD9D373D7C91D669EC220
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e2fd4559255f10fba12f2fe7c3826a5d8d64873a79dc25e0e9bc72c34cfb8264
      • Instruction ID: a36bc85461610d66a5684db3dc1aaf50a1fbc0ce1e15ed8d98c95861719c5acc
      • Opcode Fuzzy Hash: e2fd4559255f10fba12f2fe7c3826a5d8d64873a79dc25e0e9bc72c34cfb8264
      • Instruction Fuzzy Hash: 6B41E662718E5582EF04DF2ADE1426AB391BB48FE0B899037EE4D97B54DF3DD0498700
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a33e2c8dffc1328ccb3c79931647987677b9da288923bf574ced27deaffa7ee3
      • Instruction ID: 0b2456eacbd27b7a5ef3f9433d6cacdb4fd5b9eb31a85f2eb00c0d242d2d537d
      • Opcode Fuzzy Hash: a33e2c8dffc1328ccb3c79931647987677b9da288923bf574ced27deaffa7ee3
      • Instruction Fuzzy Hash: BA31E172B0CF4241E664AF256C8012FAAD5AB84BA0F954238EA9D57BD5DF3CD0058710
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5d3ac10822f6242d2b374fc0e1218152d8e80c351f0dfcd4fab21387456caa74
      • Instruction ID: 374661d679bb3ece84aa3103ab3b55ed4d6e1990ccc6d53288f8e765ee958b72
      • Opcode Fuzzy Hash: 5d3ac10822f6242d2b374fc0e1218152d8e80c351f0dfcd4fab21387456caa74
      • Instruction Fuzzy Hash: 07F06872B186958BDB989F6DA80266A7BD0F7083D0F808039E58D83B04DA3CD0658F54

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1165 7ff716201950-7ff71620198b call 7ff7162045c0 1168 7ff716201991-7ff7162019d1 call 7ff716207f90 1165->1168 1169 7ff716201c4e-7ff716201c72 call 7ff71620c550 1165->1169 1174 7ff716201c3b-7ff716201c4b call 7ff71621004c 1168->1174 1175 7ff7162019d7-7ff7162019e7 call 7ff7162106d4 1168->1175 1174->1169 1180 7ff7162019e9-7ff716201a03 call 7ff716214f08 call 7ff716202910 1175->1180 1181 7ff716201a08-7ff716201a24 call 7ff71621039c 1175->1181 1180->1174 1187 7ff716201a26-7ff716201a40 call 7ff716214f08 call 7ff716202910 1181->1187 1188 7ff716201a45-7ff716201a5a call 7ff716214f28 1181->1188 1187->1174 1195 7ff716201a5c-7ff716201a76 call 7ff716214f08 call 7ff716202910 1188->1195 1196 7ff716201a7b-7ff716201b14 call 7ff716201c80 * 2 call 7ff7162106d4 call 7ff716214f44 1188->1196 1195->1174 1210 7ff716201b16-7ff716201b30 call 7ff716214f08 call 7ff716202910 1196->1210 1211 7ff716201b35-7ff716201b4e call 7ff71621039c 1196->1211 1210->1174 1217 7ff716201b50-7ff716201b6a call 7ff716214f08 call 7ff716202910 1211->1217 1218 7ff716201b6f-7ff716201b8b call 7ff716210110 1211->1218 1217->1174 1225 7ff716201b9e-7ff716201bac 1218->1225 1226 7ff716201b8d-7ff716201b99 call 7ff716202710 1218->1226 1225->1174 1229 7ff716201bb2-7ff716201bb9 1225->1229 1226->1174 1231 7ff716201bc1-7ff716201bc7 1229->1231 1232 7ff716201be0-7ff716201bef 1231->1232 1233 7ff716201bc9-7ff716201bd6 1231->1233 1232->1232 1234 7ff716201bf1-7ff716201bfa 1232->1234 1233->1234 1235 7ff716201c0f 1234->1235 1236 7ff716201bfc-7ff716201bff 1234->1236 1237 7ff716201c11-7ff716201c24 1235->1237 1236->1235 1238 7ff716201c01-7ff716201c04 1236->1238 1240 7ff716201c26 1237->1240 1241 7ff716201c2d-7ff716201c39 1237->1241 1238->1235 1239 7ff716201c06-7ff716201c09 1238->1239 1239->1235 1242 7ff716201c0b-7ff716201c0d 1239->1242 1240->1241 1241->1174 1241->1231 1242->1237
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _fread_nolock
      • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
      • API String ID: 840049012-3497178890
      • Opcode ID: 85b25b29a176bc83ae3a1b74fdbb3e17cfe2198aa0bc5e09dcfbdbd9a14dfb03
      • Instruction ID: bc1c90cec9b7d473bcab9a3932af243cfa87d1cf25f3991abbf7746bb569d176
      • Opcode Fuzzy Hash: 85b25b29a176bc83ae3a1b74fdbb3e17cfe2198aa0bc5e09dcfbdbd9a14dfb03
      • Instruction Fuzzy Hash: 9081C071A0CE8686EB20FB64D8442FBA3A1AF487A5F904035E98D47785DF3CE58D8721

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1243 7ff716201600-7ff716201611 1244 7ff716201613-7ff71620161c call 7ff716201050 1243->1244 1245 7ff716201637-7ff716201651 call 7ff7162045c0 1243->1245 1250 7ff71620162e-7ff716201636 1244->1250 1251 7ff71620161e-7ff716201629 call 7ff716202710 1244->1251 1252 7ff716201653-7ff716201681 call 7ff716214f08 call 7ff716202910 1245->1252 1253 7ff716201682-7ff71620169c call 7ff7162045c0 1245->1253 1251->1250 1260 7ff71620169e-7ff7162016b3 call 7ff716202710 1253->1260 1261 7ff7162016b8-7ff7162016cf call 7ff7162106d4 1253->1261 1267 7ff716201821-7ff71620183b call 7ff71621004c 1260->1267 1268 7ff7162016d1-7ff7162016f4 call 7ff716214f08 call 7ff716202910 1261->1268 1269 7ff7162016f9-7ff7162016fd 1261->1269 1284 7ff716201819-7ff71620181c call 7ff71621004c 1268->1284 1272 7ff7162016ff-7ff716201712 call 7ff716201210 1269->1272 1273 7ff716201717-7ff716201737 call 7ff716214f44 1269->1273 1272->1284 1281 7ff716201761-7ff71620176c 1273->1281 1282 7ff716201739-7ff71620175c call 7ff716214f08 call 7ff716202910 1273->1282 1286 7ff716201802-7ff71620180a call 7ff716214f30 1281->1286 1287 7ff716201772-7ff716201777 1281->1287 1297 7ff71620180f-7ff716201814 1282->1297 1284->1267 1286->1297 1290 7ff716201780-7ff7162017a2 call 7ff71621039c 1287->1290 1298 7ff7162017a4-7ff7162017bc call 7ff716210adc 1290->1298 1299 7ff7162017da-7ff7162017e6 call 7ff716214f08 1290->1299 1297->1284 1305 7ff7162017c5-7ff7162017d8 call 7ff716214f08 1298->1305 1306 7ff7162017be-7ff7162017c1 1298->1306 1304 7ff7162017ed-7ff7162017f8 call 7ff716202910 1299->1304 1312 7ff7162017fd 1304->1312 1305->1304 1306->1290 1309 7ff7162017c3 1306->1309 1309->1312 1312->1286
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
      • API String ID: 0-1550345328
      • Opcode ID: 10ad1ac658e299a32776e4f5c7df64e1b6feaa7ef6c238e08fbfef3a4424164a
      • Instruction ID: 6a94c8946526b422d51864dfaaa649d124f92af66bdbdbd9fd656d37aff36923
      • Opcode Fuzzy Hash: 10ad1ac658e299a32776e4f5c7df64e1b6feaa7ef6c238e08fbfef3a4424164a
      • Instruction Fuzzy Hash: EA518B61B09E4782EA10BBA19C001ABA3A1BF447B9FD48536EE1C47796DF3CE55DC720

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1381 2a639ec12d8-2a639ec12de 1382 2a639ec12e0-2a639ec12e3 1381->1382 1383 2a639ec1319-2a639ec1323 1381->1383 1385 2a639ec12e5-2a639ec12e8 1382->1385 1386 2a639ec130d-2a639ec134c call 2a639ec1898 1382->1386 1384 2a639ec1440-2a639ec1455 1383->1384 1390 2a639ec1464-2a639ec147e call 2a639ec172c 1384->1390 1391 2a639ec1457 1384->1391 1388 2a639ec1300 __scrt_dllmain_crt_thread_attach 1385->1388 1389 2a639ec12ea-2a639ec12ed 1385->1389 1401 2a639ec1352-2a639ec1367 call 2a639ec172c 1386->1401 1402 2a639ec141a 1386->1402 1397 2a639ec1305-2a639ec130c 1388->1397 1393 2a639ec12ef-2a639ec12f8 1389->1393 1394 2a639ec12f9-2a639ec12fe call 2a639ec17dc 1389->1394 1404 2a639ec1480-2a639ec14b5 call 2a639ec1854 call 2a639ec16fc call 2a639ec1bf0 call 2a639ec1a08 call 2a639ec1a2c call 2a639ec1884 1390->1404 1405 2a639ec14b7-2a639ec14e8 call 2a639ec1a68 1390->1405 1395 2a639ec1459-2a639ec1463 1391->1395 1394->1397 1414 2a639ec1432-2a639ec143f call 2a639ec1a68 1401->1414 1415 2a639ec136d-2a639ec137e call 2a639ec179c 1401->1415 1407 2a639ec141c-2a639ec1431 1402->1407 1404->1395 1416 2a639ec14ea-2a639ec14f0 1405->1416 1417 2a639ec14f9-2a639ec14ff 1405->1417 1414->1384 1433 2a639ec13cf-2a639ec13d9 call 2a639ec1a08 1415->1433 1434 2a639ec1380-2a639ec13a4 call 2a639ec1bb4 call 2a639ec16ec call 2a639ec1710 call 2a639ec4680 1415->1434 1416->1417 1418 2a639ec14f2-2a639ec14f4 1416->1418 1419 2a639ec1501-2a639ec150b 1417->1419 1420 2a639ec1546-2a639ec155c call 2a639ec16e4 1417->1420 1424 2a639ec15e7-2a639ec15f4 1418->1424 1425 2a639ec150d-2a639ec1515 1419->1425 1426 2a639ec1517-2a639ec1525 1419->1426 1441 2a639ec1594-2a639ec1596 1420->1441 1442 2a639ec155e-2a639ec1560 1420->1442 1431 2a639ec152b-2a639ec1540 call 2a639ec12d8 1425->1431 1426->1431 1445 2a639ec15dd-2a639ec15e5 1426->1445 1431->1420 1431->1445 1433->1402 1454 2a639ec13db-2a639ec13e7 call 2a639ec1a58 1433->1454 1434->1433 1481 2a639ec13a6-2a639ec13ad __scrt_dllmain_after_initialize_c 1434->1481 1443 2a639ec159d-2a639ec15b2 call 2a639ec12d8 1441->1443 1444 2a639ec1598-2a639ec159b 1441->1444 1442->1441 1450 2a639ec1562-2a639ec1584 call 2a639ec16e4 call 2a639ec1440 1442->1450 1443->1445 1464 2a639ec15b4-2a639ec15be 1443->1464 1444->1443 1444->1445 1445->1424 1450->1441 1475 2a639ec1586-2a639ec158c 1450->1475 1472 2a639ec140d-2a639ec1418 1454->1472 1473 2a639ec13e9-2a639ec13f3 call 2a639ec1970 1454->1473 1469 2a639ec15c0-2a639ec15c7 1464->1469 1470 2a639ec15c9-2a639ec15d9 1464->1470 1469->1445 1470->1445 1472->1407 1473->1472 1480 2a639ec13f5-2a639ec140a 1473->1480 1475->1441 1480->1472 1481->1433 1482 2a639ec13af-2a639ec13cd call 2a639ec461c 1481->1482 1482->1433
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1397741841.000002A639EC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002A639EC1000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2a639ec1000_90m2xwxCOf.jbxd
      Similarity
      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_fastfail__scrt_release_startup_lock
      • String ID:
      • API String ID: 2904100720-0
      • Opcode ID: bdc4e10cf2850800bad6ec58f36eb416631004feb4e78b6242bb27f2f577f552
      • Instruction ID: 7f2e96c2311ee74a5222fe86ea55e543e6b61126c99a9a0ca9824b1311c0bf5a
      • Opcode Fuzzy Hash: bdc4e10cf2850800bad6ec58f36eb416631004feb4e78b6242bb27f2f577f552
      • Instruction Fuzzy Hash: A0919A3AB186054BFF74A768946D3AB3AD1EF57B00F484199EC85C3292DF24D8468F43
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: -$:$f$p$p
      • API String ID: 3215553584-2013873522
      • Opcode ID: b7e22ce4f74af2d1023d9e5852fe48feb6e043baf8196cd40c3e1ea19e832e16
      • Instruction ID: 302697b32836dfeaa9e95c71c8aea30e8c4dc42595601834426ea08b7163490a
      • Opcode Fuzzy Hash: b7e22ce4f74af2d1023d9e5852fe48feb6e043baf8196cd40c3e1ea19e832e16
      • Instruction Fuzzy Hash: A41283A2E0DAA386FB307B14DD5427FF691FB50760FD48135D69946AC4DB3CE5888B20
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: f$f$p$p$f
      • API String ID: 3215553584-1325933183
      • Opcode ID: aa0fbff0f347da908d5507dbb8c304165b2bf985efd8a5cf476f5df367044c76
      • Instruction ID: a18027168a3f5eb110eb9e973cd1a23ab66debd1c5fe32e6510428be8dc34373
      • Opcode Fuzzy Hash: aa0fbff0f347da908d5507dbb8c304165b2bf985efd8a5cf476f5df367044c76
      • Instruction Fuzzy Hash: 8E12A8F1E0C98386FB247A14EC482BBF6A5FB50765FE44031D69946AC8DB3CE5498B60

      Control-flow Graph

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
      • API String ID: 0-3659356012
      • Opcode ID: 7353426b42f42a82694b3592670e666301d967352ad9965b6266ed7fbff1557c
      • Instruction ID: dae7a643928080a4be44a9d7a0fd56cd1d013150a17a1c62b17aa6f2dfaf1ca2
      • Opcode Fuzzy Hash: 7353426b42f42a82694b3592670e666301d967352ad9965b6266ed7fbff1557c
      • Instruction Fuzzy Hash: A4419B61B09A5282EA04FB52AC046BBE391BF54BE5FE48432ED4C07796DE3CE5498760

      Control-flow Graph

      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
      • API String ID: 0-3659356012
      • Opcode ID: 8e50aaae5ab3d411fe7ab9835250eb0ac1eca1baedb3c6f350960e0e7df48aeb
      • Instruction ID: 4dd3c6ba6fb4091bf0d545c30397e67744a8fe3c2d5b12a07c70b7f9b8ba1bd0
      • Opcode Fuzzy Hash: 8e50aaae5ab3d411fe7ab9835250eb0ac1eca1baedb3c6f350960e0e7df48aeb
      • Instruction Fuzzy Hash: 31418E66A09A4286EB10FB619C405BBE391BF447A8FD48432ED4D0BB99DE3CE549C720

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 1987 7ff71620ea08-7ff71620ea70 call 7ff71620f9bc 1990 7ff71620eed1-7ff71620eed7 call 7ff71621a504 1987->1990 1991 7ff71620ea76-7ff71620ea79 1987->1991 1991->1990 1992 7ff71620ea7f-7ff71620ea85 1991->1992 1994 7ff71620ea8b-7ff71620ea8f 1992->1994 1995 7ff71620eb54-7ff71620eb66 1992->1995 1994->1995 1999 7ff71620ea95-7ff71620eaa0 1994->1999 1997 7ff71620eb6c-7ff71620eb70 1995->1997 1998 7ff71620ee21-7ff71620ee25 1995->1998 1997->1998 2002 7ff71620eb76-7ff71620eb81 1997->2002 2000 7ff71620ee27-7ff71620ee2e 1998->2000 2001 7ff71620ee5e-7ff71620ee68 call 7ff71620db00 1998->2001 1999->1995 2003 7ff71620eaa6-7ff71620eaab 1999->2003 2000->1990 2004 7ff71620ee34-7ff71620ee59 call 7ff71620eed8 2000->2004 2001->1990 2013 7ff71620ee6a-7ff71620ee89 call 7ff71620c550 2001->2013 2002->1998 2006 7ff71620eb87-7ff71620eb8b 2002->2006 2003->1995 2007 7ff71620eab1-7ff71620eabb call 7ff71620db00 2003->2007 2004->2001 2010 7ff71620ed51-7ff71620ed5d 2006->2010 2011 7ff71620eb91-7ff71620ebcc call 7ff71620e1c0 2006->2011 2007->2013 2017 7ff71620eac1-7ff71620eaec call 7ff71620db00 * 2 call 7ff71620e4c8 2007->2017 2010->2001 2014 7ff71620ed63-7ff71620ed67 2010->2014 2011->2010 2022 7ff71620ebd2-7ff71620ebdb 2011->2022 2019 7ff71620ed77-7ff71620ed7f 2014->2019 2020 7ff71620ed69-7ff71620ed75 call 7ff71620e488 2014->2020 2054 7ff71620eb0c-7ff71620eb16 call 7ff71620db00 2017->2054 2055 7ff71620eaee-7ff71620eaf2 2017->2055 2019->2001 2026 7ff71620ed85-7ff71620ed92 call 7ff71620e060 2019->2026 2020->2019 2035 7ff71620ed98-7ff71620eda0 2020->2035 2028 7ff71620ebdf-7ff71620ec11 2022->2028 2026->2001 2026->2035 2032 7ff71620ec17-7ff71620ec23 2028->2032 2033 7ff71620ed44-7ff71620ed4b 2028->2033 2032->2033 2036 7ff71620ec29-7ff71620ec48 2032->2036 2033->2010 2033->2028 2037 7ff71620eeb4-7ff71620eed0 call 7ff71620db00 * 2 call 7ff71621a3d8 2035->2037 2038 7ff71620eda6-7ff71620edaa 2035->2038 2040 7ff71620ec4e-7ff71620ec8b call 7ff71620e49c * 2 2036->2040 2041 7ff71620ed34-7ff71620ed39 2036->2041 2037->1990 2042 7ff71620edac-7ff71620edbb call 7ff71620e488 2038->2042 2043 7ff71620edbd 2038->2043 2067 7ff71620ecbe-7ff71620ecc1 2040->2067 2041->2033 2050 7ff71620edbf-7ff71620edc9 call 7ff71620fa54 2042->2050 2043->2050 2050->2001 2065 7ff71620edcf-7ff71620ee1f call 7ff71620e0f0 call 7ff71620e2f4 2050->2065 2054->1995 2070 7ff71620eb18-7ff71620eb38 call 7ff71620db00 * 2 call 7ff71620fa54 2054->2070 2055->2054 2059 7ff71620eaf4-7ff71620eaff 2055->2059 2059->2054 2064 7ff71620eb01-7ff71620eb06 2059->2064 2064->1990 2064->2054 2065->2001 2071 7ff71620ec8d-7ff71620ecb3 call 7ff71620e49c call 7ff71620f148 2067->2071 2072 7ff71620ecc3-7ff71620ecca 2067->2072 2092 7ff71620eb3a-7ff71620eb44 call 7ff71620fb44 2070->2092 2093 7ff71620eb4f 2070->2093 2089 7ff71620ecd5-7ff71620ed32 call 7ff71620e934 2071->2089 2090 7ff71620ecb5-7ff71620ecb8 2071->2090 2075 7ff71620ed3b 2072->2075 2076 7ff71620eccc-7ff71620ecd0 2072->2076 2081 7ff71620ed40 2075->2081 2076->2040 2081->2033 2089->2081 2090->2067 2097 7ff71620eb4a-7ff71620eead call 7ff71620d8d0 call 7ff71620f504 call 7ff71620fd48 2092->2097 2098 7ff71620eeae-7ff71620eeb3 call 7ff71621a3d8 2092->2098 2093->1995 2097->2098 2098->2037
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
      • String ID: csm$csm$csm
      • API String ID: 849930591-393685449
      • Opcode ID: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
      • Instruction ID: 7a9dbd9b87773f08580b91f63d1e5060516d88d28c96f5ad30b54390a70dccd8
      • Opcode Fuzzy Hash: aab7c7e636ea8a2572919ef13f94062ff4905efd63cd4babadd9079b892b9703
      • Instruction Fuzzy Hash: 15D18272A08B4586EB20FF25D8403AEB7A0FB557A8F900135DE8D57B96DF38E489C710

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 2108 7ff716201210-7ff71620126d call 7ff71620bd80 2111 7ff71620126f-7ff716201296 call 7ff716202710 2108->2111 2112 7ff716201297-7ff7162012af call 7ff716214f44 2108->2112 2117 7ff7162012d4-7ff7162012e4 call 7ff716214f44 2112->2117 2118 7ff7162012b1-7ff7162012cf call 7ff716214f08 call 7ff716202910 2112->2118 2124 7ff7162012e6-7ff716201304 call 7ff716214f08 call 7ff716202910 2117->2124 2125 7ff716201309-7ff71620131b 2117->2125 2130 7ff716201439-7ff71620146d call 7ff71620ba60 call 7ff716214f30 * 2 2118->2130 2124->2130 2128 7ff716201320-7ff716201345 call 7ff71621039c 2125->2128 2136 7ff716201431 2128->2136 2137 7ff71620134b-7ff716201355 call 7ff716210110 2128->2137 2136->2130 2137->2136 2144 7ff71620135b-7ff716201367 2137->2144 2146 7ff716201370-7ff716201398 call 7ff71620a1c0 2144->2146 2149 7ff716201416-7ff71620142c call 7ff716202710 2146->2149 2150 7ff71620139a-7ff71620139d 2146->2150 2149->2136 2151 7ff716201411 2150->2151 2152 7ff71620139f-7ff7162013a9 2150->2152 2151->2149 2154 7ff7162013d4-7ff7162013d7 2152->2154 2155 7ff7162013ab-7ff7162013c1 call 7ff716210adc 2152->2155 2156 7ff7162013ea-7ff7162013ef 2154->2156 2157 7ff7162013d9-7ff7162013e7 call 7ff716229e30 2154->2157 2165 7ff7162013c3-7ff7162013cd call 7ff716210110 2155->2165 2166 7ff7162013cf-7ff7162013d2 2155->2166 2156->2146 2160 7ff7162013f5-7ff7162013f8 2156->2160 2157->2156 2163 7ff71620140c-7ff71620140f 2160->2163 2164 7ff7162013fa-7ff7162013fd 2160->2164 2163->2136 2164->2149 2167 7ff7162013ff-7ff716201407 2164->2167 2165->2156 2165->2166 2166->2149 2167->2128
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID:
      • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
      • API String ID: 0-2813020118
      • Opcode ID: 5ad7029722e9e2f6923f5db6a59ac32f4b16dfce7729f192b8578fd94d2afe4f
      • Instruction ID: 60a3713afa7dc51009e3c560bc50e7a78225911850c0b43dfc95922a47d32c15
      • Opcode Fuzzy Hash: 5ad7029722e9e2f6923f5db6a59ac32f4b16dfce7729f192b8578fd94d2afe4f
      • Instruction Fuzzy Hash: 2751E162A09E4285EA20BB51AC403BBE291FF857A9FD44135ED4D47BD5EF3CE449C720
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _set_statfp
      • String ID:
      • API String ID: 1156100317-0
      • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
      • Instruction ID: 8f1a365b1b2877d86e2600fbdf08b7276319e6d8b8c86b0b036004076cacb762
      • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
      • Instruction Fuzzy Hash: F0114222F5CE0301FB68316BECA53BB9152BF593F4E84463CFA6E562D6CE6C68494121
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: verbose
      • API String ID: 3215553584-579935070
      • Opcode ID: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
      • Instruction ID: 547cf158481a8c18467cbe791500e9eddd6e0432bad87a819098196fbf1c1c96
      • Opcode Fuzzy Hash: 8c3a45f75ca5c0a3459ca2e96ae2fbbf181a3d63a640e770f0a7cf37c7606cec
      • Instruction Fuzzy Hash: 1791CFA2A0CE6681F771AF24DC5037FB6A1AB40BA4FD44136DA5D437D6DE3DE8498320
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: UTF-16LEUNICODE$UTF-8$ccs
      • API String ID: 3215553584-1196891531
      • Opcode ID: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
      • Instruction ID: 7e4c658be22cdb5910c33d9820bd7b5151d1d721db9d6f2310e558dbe6a123b3
      • Opcode Fuzzy Hash: 7089664b0a027e884898b454f5d4d61e653d4f3baae8c024cbe23c99275e4c13
      • Instruction Fuzzy Hash: 2281C2F2D0CE4385F764BE2D8D00A7BA6E0AB21B64FD54035CE19972D9CB2DE9099321
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1397741841.000002A639EC1000.00000040.00001000.00020000.00000000.sdmp, Offset: 000002A639EC1000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_2a639ec1000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _invalid_parameter_noinfo
      • String ID: $*
      • API String ID: 3215553584-3982473090
      • Opcode ID: f29546d3a36cf79c47e3619aed576d9b14d69aabdb658179f5724d34d282a78c
      • Instruction ID: fd58a4a656b48a80eae1d957e420d9a6ebd8e5a9c9f33e75a94e9803e4d18eef
      • Opcode Fuzzy Hash: f29546d3a36cf79c47e3619aed576d9b14d69aabdb658179f5724d34d282a78c
      • Instruction Fuzzy Hash: B9615272A046448BEFB99F18C0ED3663EA1BF17715F5821D9CC828A1D6DB65C487CE42
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
      • String ID: csm$csm
      • API String ID: 3896166516-3733052814
      • Opcode ID: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
      • Instruction ID: cad14c079e34614be78506fb19d06dae0bb785237eccb5b81a82caef0136e6bc
      • Opcode Fuzzy Hash: b828653c103bc27f8420a51a056d9897bfd6e6497fd7c081c32eb92dd3ed2bbb
      • Instruction Fuzzy Hash: C351A332A48B8286EB74BB29994476AB7A0FB54BA4F944135DF4C43BC5CF3CE458C711
      APIs
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _get_daylight$_isindst
      • String ID:
      • API String ID: 4170891091-0
      • Opcode ID: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
      • Instruction ID: a11e8672dc4ec30a3b255762d1c1cd3c7c2dac897d5d6045370f6e2981566bd4
      • Opcode Fuzzy Hash: 873197461a12b50781dd6dd2a54ab0b7f590f407db75148e336b6c99fa373a01
      • Instruction Fuzzy Hash: DC514DB2F08A1186FB14EF688D51A7EA791AF14378F900235DD2D53AD4DF3CA50AC710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: CurrentImageNonwritable__except_validate_context_record
      • String ID: csm
      • API String ID: 3242871069-1018135373
      • Opcode ID: 12afe3ddf8923ddabe2e4fbe2cdad78b5d93db4a8052962e6f126e70e1b0d1c2
      • Instruction ID: 9022e1c0b506310b57c5aa18ae4c331db8ef9b94664cf494a0ec9111b735be2a
      • Opcode Fuzzy Hash: 12afe3ddf8923ddabe2e4fbe2cdad78b5d93db4a8052962e6f126e70e1b0d1c2
      • Instruction Fuzzy Hash: E5519237B1AA028ADB14FF15E844A7EB391EB44BA8F908934EA4D47754DF7CE845C710
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: CallTranslator
      • String ID: MOC$RCC
      • API String ID: 3163161869-2084237596
      • Opcode ID: 39c1f0c2e48683ae2c7761d12c305b0cd6275173a9a64f984acdc1fd1f3c1034
      • Instruction ID: fd41467d03469bf523cb0888a3b760e334591143ce18346c1fae21cba30ced30
      • Opcode Fuzzy Hash: 39c1f0c2e48683ae2c7761d12c305b0cd6275173a9a64f984acdc1fd1f3c1034
      • Instruction Fuzzy Hash: B9519072908BC585EB60AB15E8407AAF7A0FB857A4F444625EF9C03B99CF7CD194CB10
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000001.00000002.1398094911.00007FF716201000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF716200000, based on PE: true
      • Associated: 00000001.00000002.1398073923.00007FF716200000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398119983.00007FF71622B000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398166851.00007FF71623E000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1398185994.00007FF716244000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399013800.00007FF716258000.00000020.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399104409.00007FF716355000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000001.00000002.1399128153.00007FF71635F000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_1_2_7ff716200000_90m2xwxCOf.jbxd
      Similarity
      • API ID: _get_daylight$_invalid_parameter_noinfo
      • String ID: ?
      • API String ID: 1286766494-1684325040
      • Opcode ID: 9a7f400d0f6806ffebb0fb5bd147589810dfa8003abc051b845f313caa71493e
      • Instruction ID: 80b08cbe7069b6de15468e050855375f53e0e9bb40001153d50bee8271c295f6
      • Opcode Fuzzy Hash: 9a7f400d0f6806ffebb0fb5bd147589810dfa8003abc051b845f313caa71493e
      • Instruction Fuzzy Hash: FC411B12A18A8245F760AB25DD0137BE792EB80BB4F948239EE5D06AD9DF3CD4458710