Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe
Analysis ID:1521528
MD5:b954dc27c4bf7b87dcc365ee9e1c99db
SHA1:405dd8848ecbc7dce62978bf96571d9c2a8bf8f8
SHA256:5af43067ad6e35eca23cbfe8de88d89984e9f1996625a8bba845669c5f9fb10b
Tags:exe
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to detect virtual machines (STR)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Detected potential crypto function
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
One or more processes crash
PE file contains an invalid checksum
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe (PID: 3872 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe" MD5: B954DC27C4BF7B87DCC365EE9E1C99DB)
    • WerFault.exe (PID: 5880 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 488 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 2996 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 508 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeAvira: detected
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeReversingLabs: Detection: 68%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 84.3% probability
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: tse1.mm.bing.net
Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_0007DBB14_2_0007DBB1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_000843C64_2_000843C6
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_000766694_2_00076669
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_000837744_2_00083774
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: String function: 000804C0 appears 36 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 488
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe, 00000004.00000000.2304213204.000000000011A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBuild.exeD vs SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeBinary or memory string: OriginalFilenameBuild.exeD vs SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@3/9@1/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3872
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\196abeed-8e62-4e78-8ffe-0cd99aa368feJump to behavior
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeReversingLabs: Detection: 68%
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe "C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 488
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 508
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeSection loaded: apphelp.dllJump to behavior
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeStatic PE information: More than 200 imports for user32.dll
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeStatic PE information: More than 200 imports for kernel32.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_0007B0F2 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_0007B0F2
Source: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeStatic PE information: real checksum: 0xc43c0 should be: 0xc7e5d
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_00078100 push eax; ret 4_2_00078114
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_00078100 push eax; ret 4_2_0007813C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_000804FB push ecx; ret 4_2_0008050B
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_00078EE9 push ss; ret 4_2_00078F47
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_00075E71 str word ptr [ecx-275CF5FCh]4_2_00075E71
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_4-12524
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeAPI coverage: 1.3 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_00071762 VirtualQuery,GetSystemInfo,VirtualQuery,VirtualAlloc,VirtualProtect,4_2_00071762
Source: Amcache.hve.7.drBinary or memory string: VMware
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.7.drBinary or memory string: vmci.sys
Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.7.drBinary or memory string: VMware20,1
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeAPI call chain: ExitProcess graph end nodegraph_4-12529
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeAPI call chain: ExitProcess graph end nodegraph_4-12543
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_0007B0F2 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,4_2_0007B0F2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: GetLocaleInfoA,4_2_0007846D
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_0007EEE8 __lock,_strcat,_strncpy,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,WideCharToMultiByte,_strncpy,4_2_0007EEE8
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exeCode function: 4_2_00081596 EntryPoint,GetVersionExA,GetModuleHandleA,GetModuleHandleA,_fast_error_exit,_fast_error_exit,GetCommandLineA,GetStartupInfoA,__wincmdln,GetModuleHandleA,4_2_00081596
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Deobfuscate/Decode Files or Information
Security Account Manager2
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDS13
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe68%ReversingLabsWin32.Trojan.Swizzor
SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe100%AviraTR/Dldr.Swizzor.Gen
SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
ax-0001.ax-msedge.net
150.171.28.10
truefalse
    unknown
    tse1.mm.bing.net
    unknown
    unknownfalse
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://upx.sf.netAmcache.hve.7.drfalse
      • URL Reputation: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1521528
      Start date and time:2024-09-28 22:24:13 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 47s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:16
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe
      Detection:MAL
      Classification:mal64.winEXE@3/9@1/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 2
      • Number of non-executed functions: 31
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.65.92, 20.42.73.29
      • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, login.live.com, mm-mm.bing.net.trafficmanager.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, umwatson.events.data.microsoft.com
      • VT rate limit hit for: SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe
      TimeTypeDescription
      16:25:29API Interceptor2x Sleep call for process: WerFault.exe modified
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      ax-0001.ax-msedge.nethttp://yusdydsfjuuxx.weebly.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.28.10
      http://shaw-102219.weeblysite.com/Get hashmaliciousUnknownBrowse
      • 150.171.27.10
      http://bt-103431.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.28.10
      https://att-service-102729-104589.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.28.10
      https://att-109355.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.28.10
      https://netzero-102551.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.27.10
      https://telstra-101775.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.27.10
      https://mail-109392.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.27.10
      https://att-104226.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.27.10
      https://att-103325.weeblysite.com/Get hashmaliciousHTMLPhisherBrowse
      • 150.171.27.10
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8313649670480145
      Encrypted:false
      SSDEEP:96:kYtF03RzfSszlcRfZncQXIDcQjc6qcElcw3D+HbHg/LAeugih88WpENEg92MbC4P:R2RzS909uP8jXIqzuiFMZ24IO8l
      MD5:7FBF214B51065C40645A8741A42B1E56
      SHA1:A0C0ECEA6CCFFA01D196255DA2D3D89A136731C1
      SHA-256:13F80E0085CE89684DB11F0AFD79AAAD35D3F9E8C3FD64D7AB371B94113F42E9
      SHA-512:48EEBCC3439C1AC4CF2D47BC9F1E59DB05F2EB22626371D3F0E169F3B5959FD0D374E9F41B1DF14DF32DBF21EB495D76E0590A4440FE5B7837415FEED614DE39
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.2.8.7.2.5.4.7.2.0.1.9.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.2.8.7.2.7.0.1.8.8.8.3.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.c.0.8.e.1.7.0.-.e.0.9.9.-.4.2.6.f.-.a.b.8.1.-.7.d.a.f.b.7.2.5.1.1.c.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.a.b.0.d.2.3.4.-.c.5.c.e.-.4.2.8.b.-.8.1.9.3.-.5.c.e.d.1.4.a.5.6.6.5.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...S.w.i.z.z.o.r...b.a.s.e.d...8.4.8.5...2.7.2.7.7...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.2.0.-.0.0.0.1.-.0.0.1.5.-.8.9.a.d.-.b.7.8.c.e.4.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.f.e.9.b.e.f.1.6.6.6.a.d.9.7.1.e.d.1.0.9.2.d.b.7.6.b.0.c.b.1.c.0.0.0.0.0.9.0.4.!.0.0.0.0.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.8265425130407492
      Encrypted:false
      SSDEEP:96:gAFNWITzfAszlc1yDfmQXIDcQjc6qcElcw3D+HbHg/LAeugih88WpENEg92MbC4P:9XWITzA809uP8jXIqzuiFMZ24IO8l
      MD5:21A80604732596906AAD9DCF30ABD15E
      SHA1:7497EE6521C5D4C9D846BBCC9D842338AFF614D3
      SHA-256:B4D2A8758B9D96B682D78709050588973F2FFE7358456A4FFCDE788EC0F4B011
      SHA-512:EF40CF3119824EB40397E23FE6F424A64ED7719311795428466AA7C4B1FF0E36E38BCDE30F4997B0B2AD36F9AF60E6303D94EA73B9F07754CEBC274003E8201C
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.0.2.8.7.2.9.7.0.3.4.0.8.9.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.0.2.8.7.3.0.5.4.7.1.5.1.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.4.6.0.0.b.b.9.-.7.1.9.5.-.4.d.8.d.-.b.9.e.1.-.6.3.3.f.0.6.8.3.a.2.e.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.f.a.e.a.0.2.3.-.2.0.7.e.-.4.3.0.6.-.a.f.b.c.-.4.1.c.4.a.5.b.7.d.4.e.c.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...T.r.o.j.a.n...S.w.i.z.z.o.r...b.a.s.e.d...8.4.8.5...2.7.2.7.7...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.B.u.i.l.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.f.2.0.-.0.0.0.1.-.0.0.1.5.-.8.9.a.d.-.b.7.8.c.e.4.1.1.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.f.e.9.b.e.f.1.6.6.6.a.d.9.7.1.e.d.1.0.9.2.d.b.7.6.b.0.c.b.1.c.0.0.0.0.0.9.0.4.!.0.0.0.0.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 20:25:25 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):590468
      Entropy (8bit):0.9240539913405436
      Encrypted:false
      SSDEEP:3072:5blKVJodpfavdwQQeZ9h6rpq+IvUWcJxCbyCrwyznpEB/RumDwHDvej90nkqR2Qm:lrH
      MD5:D8A580B67519AA07BD882B7B4AE458C8
      SHA1:361B381D26EE839FC82CA851BD9DBE9A8F372E03
      SHA-256:1AF2FC6234384546853E28BB7A2FB0FFF4B0B7BB9117FEA8FF4062F9B74B13B3
      SHA-512:DE2A19F5F11D7894E8D4478F8F69AC555E17CCBA47DC0DCD2AA24061E2BBC104C91E69CEE38BCFE2C425F23D977F3E614640670DFBDC23C52DE658A4AF558AC1
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......5f.f........................................."..........T.......8...........T...........................,...........................................................................................eJ..............GenuineIntel............T....... ...4f.f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8524
      Entropy (8bit):3.699619899734924
      Encrypted:false
      SSDEEP:192:R6l7wVeJxg6NF6Y2DZSUuEEgmfnan6pr/89b8IsfLUm:R6lXJ26P6YkSUhEgmfnK87fd
      MD5:F62DE14DAB6AF0D9833358068D964497
      SHA1:6892CDB5132C69387DDCADC7B1E95D532C169820
      SHA-256:F936A8FC18E2601FA0EE0B66C0DF3D1D54A7B6CB6F3C73DA454D0FBBB18CE06F
      SHA-512:31410B636ADEE71F42CE12201B63E15DB849288C2385B5D7FDCE72098E5D8877629E994DD45E204DD432DA34D779CA01A43BC777333A14442A7DE2D691621D67
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.7.2.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4909
      Entropy (8bit):4.578232891977028
      Encrypted:false
      SSDEEP:96:uIjf2I7uG7VoJ6PJQ1bqXYBl+VPvumuhRd:uIqYuG7y6PJQ1mXYBl+1vumuhv
      MD5:3DE66D160515C3887BEF17604476A9DF
      SHA1:2D352162A79671B3CA6FB5EB0E4166CFB17A86A4
      SHA-256:9282C3C080903F73F2BC5AB449C9CB81C04FA444B9856AEB3E24F1DE725D0CD3
      SHA-512:0246C27FBBC479A441065356A2D5CDA29D262C0D198A79E7A41C98BC3E1670FC738A89FB28C27CE71374D7D893AA5777740CFA0FAB94DEDAAB70E04367B60511
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520528" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Sat Sep 28 20:25:29 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):586736
      Entropy (8bit):0.9189702916923299
      Encrypted:false
      SSDEEP:3072:3GKVJodpfavdwQQeZ9h6rpq+IvUWcJxCbyCrwyznpEB/RumDwHDvej90nkqR2QWR:erH3
      MD5:8D06F1DB4CCA6064F56FF67B7E569419
      SHA1:45AB75B3C9D0C0DBE7C138466EE0DED5AB3EF45E
      SHA-256:77651D3D9E9E73437E5EBF2AD20BDF83455E752BFBC9C64CF259263307EC3D88
      SHA-512:B8333AFEE8102B18008A3BA4BE40CC79592A3FD57751891CC0DBFA3EA96E3B52552C2BCDEBF2F0496A3F50310DED39608A56F04F383CC30E2B169872B1CA8725
      Malicious:false
      Preview:MDMP..a..... .......9f.f........................................."..........T.......8...........T...........p...............,...........................................................................................eJ..............GenuineIntel............T....... ...4f.f.............................0..2...........,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8454
      Entropy (8bit):3.6988572533357877
      Encrypted:false
      SSDEEP:192:R6l7wVeJxE6qF6Y2DWSUE4TgmfIJ1an6pDB89b7IsfmWIkpm:R6lXJS6A6YrSUTTgmfIJ1M77fhI3
      MD5:E96B35C89B618D6BAC9114AB24F2EA99
      SHA1:3408BB4ECD0DD90358416D3132A66D04EE1F8EB2
      SHA-256:AAB39CA72C330C01B42D656061A9D0B8B1D46FCD00904935A84DDC7051BE68E3
      SHA-512:368DBAD43635CE3CD0CDE816FA90E9005BC28DECD713084C59C6D0CDC8DF8C956B400EE7A5FB63777794AC67D2E95D0A305D39C9B70BC47A8E23E14B731FA9DB
      Malicious:false
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.8.7.2.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4839
      Entropy (8bit):4.544877028261893
      Encrypted:false
      SSDEEP:48:cvIwWl8zswtJg77aI903WpW8VYBYm8M4J6PJa2Fk+q8pXHp+VJdvunmuhRd:uIjf2I7uG7VFJ6PJeqXJ+VPvumuhRd
      MD5:6AB6BC042CA4A0C198EA68980ECDB557
      SHA1:769394818F9010DABB512AE7B5881128CDBBB1B9
      SHA-256:15066D03D2E83DFC9CFDD9DC79D7DC7C31482A457D15D6D46ACF84084FC73D78
      SHA-512:1D73D721FA1B59BA98C4707FABD565BF870AE7D16790B51BB30E6F153983CD58ECBE63A5C63C6D9F7D9C06DE0CAC47B61B4BAF3C2969F5976581FB22A288557D
      Malicious:false
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="520528" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.469007815916115
      Encrypted:false
      SSDEEP:6144:HzZfpi6ceLPx9skLmb0faZWSP3aJG8nAgeiJRMMhA2zX4WABluuNOjDH5S:TZHtaZWOKnMM6bFpkj4
      MD5:C988162B2314CE43577FFFF15F2FAEB1
      SHA1:04964741570916A1E3C4EE025AE533C00F514F02
      SHA-256:C63C9648258CE9420FBDD672F19812DA671202BA6E32509E78221B619BAF7C43
      SHA-512:6AFCF957D0CF363203B5B12DC08073D3B35233B567E74E9C7492D9C181BCDEA35FCD49B795C1B0A3C80E642E43E782CFE3E317EB80FF94D1B4C54BA46E3D4ABA
      Malicious:false
      Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.688944481915534
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe
      File size:753'664 bytes
      MD5:b954dc27c4bf7b87dcc365ee9e1c99db
      SHA1:405dd8848ecbc7dce62978bf96571d9c2a8bf8f8
      SHA256:5af43067ad6e35eca23cbfe8de88d89984e9f1996625a8bba845669c5f9fb10b
      SHA512:93e4422a32f9ead610ac73d6cca7c06f174806ab8df79d0c9fe7a5913dd6063ca8331a93c7080845792d73f6ede54ca44600bfdf1601c0622884763c7eea3150
      SSDEEP:12288:gj+jvIbgM7h8PzDlHkXOUoWwUF3g6jYc8dn9/Xp+2bqwldnBZP4OsRI+hRC:gj+8biPzDlHxUZG6j2dhZ+Y3jBZP4RIA
      TLSH:BFF40122B3C2D0B5D1C30F7469AA97108B30FDFB53B5550B79A25B8ACD72BA05E43B52
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........+..KJ..KJ..KJ..+h..IJ..l...HJ...j..JJ...B..JJ...B..JJ..XB..JJ..l...JJ...i..JJ..NF..JJ..NF..JJ...U..JJ..l...JJ..NF..JJ..RichKJ.
      Icon Hash:6623594c45050301
      Entrypoint:0x81596
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x70000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:
      Time Stamp:0x4724F87D [Sun Oct 28 21:00:45 2007 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:30d06e7f8bbe31666f40bdb01f63380e
      Instruction
      push 00000060h
      push 000E6F30h
      call 00007F58290841F3h
      mov edi, 00000094h
      mov eax, edi
      call 00007F582907BE27h
      mov dword ptr [ebp-18h], esp
      mov esi, esp
      mov dword ptr [esi], edi
      push esi
      call dword ptr [00087790h]
      mov ecx, dword ptr [esi+10h]
      mov dword ptr [000FE3BCh], ecx
      mov eax, dword ptr [esi+04h]
      mov dword ptr [000FE3C8h], eax
      mov edx, dword ptr [esi+08h]
      mov dword ptr [000FE3CCh], edx
      mov esi, dword ptr [esi+0Ch]
      and esi, 00007FFFh
      mov dword ptr [000FE3C0h], esi
      cmp ecx, 02h
      je 00007F58290852DEh
      or esi, 00008000h
      mov dword ptr [000FE3C0h], esi
      shl eax, 08h
      add eax, edx
      mov dword ptr [000FE3C4h], eax
      xor esi, esi
      push esi
      mov edi, dword ptr [000875F8h]
      call edi
      cmp word ptr [eax], 5A4Dh
      jne 00007F58290852F1h
      mov ecx, dword ptr [eax+3Ch]
      add ecx, eax
      cmp dword ptr [ecx], 00004550h
      jne 00007F58290852E4h
      movzx eax, word ptr [ecx+18h]
      cmp eax, 0000010Bh
      je 00007F58290852F1h
      cmp eax, 0000020Bh
      je 00007F58290852D7h
      mov dword ptr [ebp-1Ch], esi
      jmp 00007F58290852F9h
      cmp dword ptr [ecx+00000084h], 0Eh
      jbe 00007F58290852C4h
      xor eax, eax
      cmp dword ptr [ecx+000000F8h], esi
      jmp 00007F58290852E0h
      cmp dword ptr [ecx+74h], 0Eh
      jbe 00007F58290852B4h
      xor eax, eax
      cmp dword ptr [ecx+000000E8h], esi
      setne al
      mov dword ptr [ebp-1Ch], eax
      Programming Language:
      • [ C ] VS2005 build 50727
      • [C++] VS2005 build 50727
      • [C++] VS2003 (.NET) build 3077
      • [ASM] VS2003 (.NET) build 3077
      • [ASM] VS2005 build 50727
      • [ C ] VS2003 (.NET) build 3077
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x882140xb4.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000xd6fc.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x179580x40.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x170000x958.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x15e780x160003e777ec457934acbae462db3954e7cddFalse0.6765913529829546data6.682217353526458IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x170000x745ed0x75000ff729987c895b9f0cc1b8779b7e59245False0.9185717982104701data7.952820554625134IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x8c0000x1d0580x1e000bd9124e6bdf88aad7f3f486809dc3300False0.8010579427083333data7.228953730445401IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .rsrc0xaa0000xd6fc0xe00010a5d0e4c4165d4f07d19f9897aaf881False0.34139578683035715data5.494393495853644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_BITMAP0xaa6880x2e90Device independent bitmap graphic, 165 x 24 x 24, image size 0EnglishUnited States0.17181208053691274
      RT_ICON0xad5180x668Device independent bitmap graphic, 48 x 96 x 4, image size 0EnglishUnited States0.22073170731707317
      RT_ICON0xadb800x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishUnited States0.5101351351351351
      RT_ICON0xadca80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishUnited States0.5575692963752665
      RT_ICON0xaeb500x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishUnited States0.6163294797687862
      RT_ICON0xaf0b80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.3403526970954357
      RT_ICON0xb16600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.47701688555347094
      RT_ICON0xb27080xca8Device independent bitmap graphic, 32 x 64 x 24, image size 0EnglishUnited States0.4527777777777778
      RT_ICON0xb33b00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.45286116322701686
      RT_MENU0xb44580x3cadataEnglishUnited States0.48556701030927835
      RT_MENU0xb48240x22edataEnglishUnited States0.514336917562724
      RT_MENU0xb4a540x3e8dataEnglishUnited States0.462
      RT_MENU0xb4e3c0x422dataEnglishUnited States0.46313799621928164
      RT_MENU0xb52600x398Matlab v4 mat-file (little endian) &, numeric, rows 2490384, columns 7602249, imaginaryEnglishUnited States0.48043478260869565
      RT_MENU0xb55f80x88dataEnglishUnited States0.7352941176470589
      RT_DIALOG0xb56800x1f8dataEnglishUnited States0.5674603174603174
      RT_DIALOG0xb58780x210dataEnglishUnited States0.5397727272727273
      RT_DIALOG0xb5a880x1b0dataEnglishUnited States0.5555555555555556
      RT_DIALOG0xb5c380x14cdataEnglishUnited States0.608433734939759
      RT_DIALOG0xb5d840x2c8dataEnglishUnited States0.5154494382022472
      RT_DIALOG0xb604c0x2b0dataEnglishUnited States0.5450581395348837
      RT_DIALOG0xb62fc0x174dataEnglishUnited States0.5994623655913979
      RT_DIALOG0xb64700x188dataEnglishUnited States0.576530612244898
      RT_DIALOG0xb65f80x2e8dataEnglishUnited States0.4986559139784946
      RT_DIALOG0xb68e00x200dataEnglishUnited States0.517578125
      RT_DIALOG0xb6ae00xdcdataEnglishUnited States0.6818181818181818
      RT_DIALOG0xb6bbc0x290dataEnglishUnited States0.5167682926829268
      RT_MESSAGETABLE0xb6e4c0x538Matlab v4 mat-file (little endian) \226_\001, rows 90000, columns 90001, imaginaryEnglishUnited States0.469311377245509
      RT_GROUP_ICON0xb73840x5adataEnglishUnited States0.7
      RT_GROUP_ICON0xb73e00x22dataEnglishUnited States1.0294117647058822
      RT_VERSION0xb74040x2f8dataEnglishUnited States0.4986842105263158
      DLLImport
      comdlg32.dllPageSetupDlgA, GetSaveFileNameA, PrintDlgA, ChooseColorA, GetOpenFileNameW, GetOpenFileNameA, CommDlgExtendedError, ChooseColorW, GetSaveFileNameW
      advapi32.dllRegSetValueExA, GetLengthSid, LookupPrivilegeValueA, RegDeleteKeyW, SetSecurityDescriptorOwner, RegEnumValueA, RegCreateKeyW, ControlService, RegisterEventSourceW, DeleteService, RegCreateKeyExA, RegOpenKeyExW, QueryServiceStatus, RegQueryValueW, AdjustTokenPrivileges, DuplicateToken, CreateServiceW, ReportEventA, InitializeSecurityDescriptor, GetAclInformation, GetUserNameA, RegQueryInfoKeyA, RegDeleteKeyA, OpenThreadToken, EqualSid, DeregisterEventSource, RegEnumKeyExW, RegQueryInfoKeyW, RegisterEventSourceA, RegEnumKeyA, CloseServiceHandle, SetSecurityDescriptorDacl, RegCloseKey, SetSecurityDescriptorGroup, RevertToSelf, RegEnumValueW, GetFileSecurityW, GetFileSecurityA, GetSecurityDescriptorDacl, AccessCheck, SetServiceStatus, RegOpenKeyExA, RegDeleteValueA, OpenSCManagerA, MapGenericMask, LookupPrivilegeValueW, InitializeAcl, RegQueryValueExA, GetTokenInformation, RegCreateKeyExW, RegOpenKeyA, RegSetValueExW, FreeSid, RegEnumKeyW, OpenSCManagerW, RegQueryValueExW, RegSetValueA, RegQueryValueA, RegisterServiceCtrlHandlerA, OpenServiceA, RegDeleteValueW, OpenServiceW
      winspool.drvFindFirstPrinterChangeNotification, DeviceCapabilitiesW, SetJobW, OpenPrinterW, GetPrinterW, EnumJobsW, FindNextPrinterChangeNotification, EnumPortsW, EnumPrintersW, GetJobW, SetPrinterDataW, ClosePrinter, FreePrinterNotifyInfo, DocumentPropertiesW
      user32.dllHideCaret, DestroyWindow, GetClassLongA, IsZoomed, AppendMenuA, GetSysColorBrush, EnableMenuItem, IsDialogMessageW, TabbedTextOutA, CreatePopupMenu, MonitorFromPoint, SendDlgItemMessageA, WindowFromPoint, GetParent, DefWindowProcA, GetMenuItemRect, ShowScrollBar, GetWindowDC, MapWindowPoints, GetCapture, GetActiveWindow, LoadMenuA, SetDlgItemInt, ModifyMenuA, IsWindowVisible, PostThreadMessageW, GetUpdateRgn, wsprintfA, GetSubMenu, MoveWindow, GetSysColor, TranslateMDISysAccel, GetIconInfo, CreateMenu, IsWindowEnabled, CopyAcceleratorTableA, CharUpperBuffA, GetWindow, SetTimer, UnpackDDElParam, DispatchMessageA, SetActiveWindow, SetCapture, IsRectEmpty, GetMessagePos, GetAsyncKeyState, GetMenuItemCount, RegisterWindowMessageA, GetMessageTime, LoadIconA, DlgDirListA, GetMenuCheckMarkDimensions, RegisterClipboardFormatA, LoadMenuIndirectA, SetScrollInfo, ShowCaret, GetClassNameW, GetWindowRect, GetMenuDefaultItem, GrayStringA, TranslateMessage, CreateWindowExW, DrawIcon, GetNextDlgGroupItem, PostMessageA, SetCursor, GetDesktopWindow, ShowWindow, GetWindowTextW, UpdateWindow, IntersectRect, PostThreadMessageA, SetMenuItemInfoA, IsIconic, AppendMenuW, GetWindowRgn, DispatchMessageW, LoadCursorW, TrackPopupMenu, DrawStateA, SetForegroundWindow, DlgDirSelectExA, CreateDialogIndirectParamW, IsClipboardFormatAvailable, SetWindowLongW, TranslateAcceleratorA, GetWindowTextLengthW, DialogBoxIndirectParamW, CreateDialogParamA, GetDlgItemTextA, GetDC, SetCaretBlinkTime, AdjustWindowRectEx, IsWindowUnicode, GetPropA, SetDlgItemTextW, UnregisterClassW, InvalidateRect, mouse_event, PeekMessageA, BeginPaint, GetDlgItem, GetMenuStringW, DestroyIcon, GetScrollInfo, DdeGetData, ClientToScreen, LoadBitmapA, EnableWindow, RemoveMenu, SetWindowLongA, GetSystemMetrics, GetForegroundWindow, MessageBoxW, GetNextDlgTabItem, ArrangeIconicWindows, CharUpperA, IsDlgButtonChecked, DestroyCaret, RemovePropA, LoadImageA, DeferWindowPos, GetMenuContextHelpId, GetSystemMenu, SetMenu, DdeCreateDataHandle, GetMenuState, CallNextHookEx, KillTimer, SetScrollRange, BringWindowToTop, GetClientRect, ReleaseCapture, ExcludeUpdateRgn, DrawFocusRect, UnhookWindowsHookEx, SetScrollPos, DefFrameProcA, GetDlgCtrlID, CreateWindowExA, IsWindow, GetDlgItemInt, DrawIconEx, EmptyClipboard, SystemParametersInfoA, ToAsciiEx, wvsprintfA, SetClipboardViewer, DeleteMenu, ScreenToClient, PeekMessageW, DrawMenuBar, CopyRect, DrawFrameControl, GetScrollPos, InsertMenuA, GetClassInfoW, GetFocus, ReleaseDC, EndPaint, RedrawWindow, CallWindowProcA, GetTabbedTextExtentA, DdeFreeStringHandle, DdeConnect, GetWindowThreadProcessId, SetRectEmpty, WinHelpA, DrawTextA, GetTopWindow, GetClassInfoA, LoadCursorA, EnumChildWindows, DrawTextW, PostQuitMessage, SendDlgItemMessageW, CharLowerA, GetLastActivePopup, DrawEdge, IsMenu, SetWindowsHookExW, DestroyCursor, SetWindowRgn, RegisterClassExA, RegisterClassA, DefDlgProcA, CharNextA, GetWindowLongA, SetPropA, SetWindowsHookExA, MessageBoxA, GetCursorPos, SetRect, GetDialogBaseUnits, FrameRect, GetMenu, DestroyMenu, SetWindowTextA, SetDlgItemTextA, GetWindowTextLengthA, GetMessageW, EnableScrollBar, SetWindowPos, RegisterClassW, FillRect, SetMenuItemBitmaps, MapDialogRect, SetMenuDefaultItem, GetWindowPlacement, ModifyMenuW, GetClassNameA, DlgDirSelectComboBoxExA, GetCursor, EqualRect, OffsetRect, InflateRect, GetComboBoxInfo, MessageBeep, SendMessageA, EndDialog, SendMessageW, GetWindowTextA, DlgDirListComboBoxA, ValidateRect, CreateIconIndirect, SetWindowContextHelpId, CloseClipboard, GetWindowContextHelpId, CheckDlgButton, DefWindowProcW, GetPropW, PostMessageW, UnregisterClassA, ScrollWindowEx, GetKeyState, GetClipboardData, PtInRect, IsChild, CopyIcon, IsDialogMessageA, DragDetect, CheckMenuItem, SetFocus, GetMessageA
      kernel32.dllUnhandledExceptionFilter, WriteFile, GetVersion, QueryPerformanceCounter, lstrcpyA, TerminateThread, MapViewOfFile, VirtualFree, ReadFile, GetEnvironmentStringsW, TerminateProcess, EnumResourceLanguagesW, GetPrivateProfileStringA, FreeEnvironmentStringsW, CreateFileMappingW, FatalAppExitA, GetCommandLineA, GlobalHandle, DeleteFileA, GetCurrentThread, HeapAlloc, GetWindowsDirectoryW, GetUserDefaultLCID, FreeLibrary, HeapSize, GetStringTypeW, LocalFree, SetHandleCount, GetFullPathNameW, SetFileAttributesA, GlobalFindAtomA, GetOEMCP, GetCPInfo, GetEnvironmentVariableW, SetUnhandledExceptionFilter, MultiByteToWideChar, CreateDirectoryA, InterlockedDecrement, LCMapStringW, GetModuleFileNameA, lstrcpyW, SetLastError, WideCharToMultiByte, FindResourceA, GetFileAttributesA, GetPrivateProfileIntA, InterlockedIncrement, GetLocalTime, GetModuleHandleA, GetStdHandle, IsBadWritePtr, TlsAlloc, GlobalLock, GetTimeFormatA, TlsGetValue, ExitThread, SetFileTime, InterlockedCompareExchange, GetSystemTimeAsFileTime, MoveFileW, GetACP, GetLogicalDriveStringsA, IsDebuggerPresent, DisconnectNamedPipe, GetFullPathNameA, GetTempPathW, GetTimeZoneInformation, GetShortPathNameW, ExitProcess, GetFileTime, IsValidLocale, OpenMutexA, GetTickCount, GetStartupInfoA, TlsFree, GetFileAttributesW, HeapFree, lstrcatA, CloseHandle, GetFileSize, GetEnvironmentStrings, GetTempFileNameA, CreateMutexA, SetFileAttributesW, GetWindowsDirectoryA, EnumSystemLocalesA, FileTimeToLocalFileTime, GetStartupInfoW, GlobalMemoryStatus, UnlockFile, FlushFileBuffers, GlobalGetAtomNameA, CreateThread, FreeEnvironmentStringsA, GetStringTypeExW, GetLocaleInfoA, LCMapStringA, FindFirstFileA, MulDiv, GlobalFree, GlobalFlags, IsBadReadPtr, SuspendThread, SetStdHandle, VirtualProtect, WaitForSingleObject, GetProfileStringA, GetVersionExW, ResumeThread, GetModuleHandleW, WinExec, LoadLibraryA, SetEnvironmentVariableA, WritePrivateProfileStringW, lstrcmpiA, OpenEventA, VirtualQuery, GetOverlappedResult, GetCurrentProcess, GetExitCodeThread, GetSystemDefaultLangID, GetTempPathA, CopyFileA, UnmapViewOfFile, InterlockedExchange, SetEnvironmentVariableW, SetFilePointer, DeleteCriticalSection, RtlUnwind, VirtualAlloc, GetProcessHeap, IsValidCodePage, ReleaseMutex, EnumResourceLanguagesA, IsBadCodePtr, SetPriorityClass, GlobalFindAtomW, LoadResource, SearchPathA, HeapDestroy, GetThreadLocale, FindNextFileA, FindClose, Sleep, lstrcpynW, PeekNamedPipe, SetEndOfFile, FindNextFileW, GetCurrentProcessId, GetModuleFileNameW, GetVersionExA, ConvertDefaultLocale, InitializeCriticalSection, GlobalAddAtomW, WritePrivateProfileStringA, FindFirstFileW, SetThreadPriority, LoadLibraryW, DeleteFileW, FileTimeToSystemTime, lstrcmpW, GlobalSize, DuplicateHandle, GetCurrentDirectoryA, CreateFileA, CompareStringA, HeapCreate, LockFile, GetVolumeInformationA, RaiseException, GlobalDeleteAtom, FormatMessageW, CompareFileTime, SizeofResource, TlsSetValue, CreateFileMappingA, GetFileType, LeaveCriticalSection, GetSystemTime, SetEvent, lstrlenW, GetSystemInfo, LocalReAlloc, lstrlenA, GetCurrentThreadId, GlobalReAlloc, GetShortPathNameA, GetStringTypeA, ResetEvent, GetDateFormatA, CompareStringW, HeapReAlloc, WriteConsoleA, EnterCriticalSection, GetDiskFreeSpaceExW, GlobalAlloc, SetErrorMode, GetLocaleInfoW, GetConsoleMode, FindResourceW, SleepEx, GetLastError, GetProcAddress
      shlwapi.dllSHDeleteKeyA, PathIsUNCA, PathAddBackslashA, PathGetDriveNumberA, PathIsUNCServerA, PathUnquoteSpacesA, PathBuildRootA, PathFileExistsA, PathIsURLA, PathCombineA, PathStripToRootA, PathAppendA, PathFindExtensionA, UrlUnescapeA, PathRemoveExtensionA, PathIsDirectoryA, PathIsRootA, PathRemoveFileSpecA, PathFindFileNameA, PathRemoveBackslashA, PathIsUNCServerShareA, PathStripPathA, PathRenameExtensionA
      comctl32.dllImageList_Destroy, ImageList_GetIcon, InitializeFlatSB, ImageList_GetBkColor, ImageList_GetImageCount, DestroyPropertySheetPage, ImageList_DragEnter, ImageList_SetDragCursorImage, ImageList_SetImageCount, ImageList_Replace, PropertySheetW, CreateStatusWindowW, ImageList_BeginDrag, InitCommonControlsEx, ImageList_GetImageInfo, ImageList_Remove, ImageList_LoadImageW, ImageList_ReplaceIcon, ImageList_Add, ImageList_EndDrag, ImageList_Draw, ImageList_Create, ImageList_DrawIndirect, ImageList_DragLeave, ImageList_DragMove, CreatePropertySheetPageA, FlatSB_EnableScrollBar, _TrackMouseEvent, ImageList_GetIconSize, ImageList_SetBkColor, ImageList_LoadImageA, ImageList_AddMasked
      oleaut32.dllLoadTypeLib
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Sep 28, 2024 22:25:20.495116949 CEST6068153192.168.2.61.1.1.1
      Sep 28, 2024 22:26:06.893265963 CEST5361583162.159.36.2192.168.2.6
      Sep 28, 2024 22:26:07.734683037 CEST53523121.1.1.1192.168.2.6
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Sep 28, 2024 22:25:20.495116949 CEST192.168.2.61.1.1.10x2a00Standard query (0)tse1.mm.bing.netA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Sep 28, 2024 22:25:20.502981901 CEST1.1.1.1192.168.2.60x2a00No error (0)tse1.mm.bing.netmm-mm.bing.net.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
      Sep 28, 2024 22:25:20.502981901 CEST1.1.1.1192.168.2.60x2a00No error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false
      Sep 28, 2024 22:25:20.502981901 CEST1.1.1.1192.168.2.60x2a00No error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:4
      Start time:16:25:24
      Start date:28/09/2024
      Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Swizzor.based.8485.27277.exe"
      Imagebase:0x70000
      File size:753'664 bytes
      MD5 hash:B954DC27C4BF7B87DCC365EE9E1C99DB
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:7
      Start time:16:25:25
      Start date:28/09/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 488
      Imagebase:0x310000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Target ID:9
      Start time:16:25:29
      Start date:28/09/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 508
      Imagebase:0x310000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >

        Execution Graph

        Execution Coverage:0.3%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:6.4%
        Total number of Nodes:612
        Total number of Limit Nodes:1
        execution_graph 12224 81596 12225 815a2 _fast_error_exit ___free_lc_time 12224->12225 12226 815ae GetVersionExA 12225->12226 12227 815ea 12226->12227 12228 815f6 GetModuleHandleA 12226->12228 12227->12228 12229 81612 12228->12229 12268 75321 HeapCreate 12229->12268 12231 81664 12232 81670 12231->12232 12292 81572 12231->12292 12276 7138e 12232->12276 12235 81676 12236 81681 12235->12236 12237 81572 _fast_error_exit 57 API calls 12235->12237 12300 7f313 12236->12300 12237->12236 12240 8169b GetCommandLineA 12321 801c2 12240->12321 12241 81693 12315 8154d 12241->12315 12247 816b5 12248 816c0 12247->12248 12250 8154d __lock 57 API calls 12247->12250 12351 80dfe 12248->12351 12250->12248 12252 816d1 12363 715f5 12252->12363 12253 8154d __lock 57 API calls 12253->12252 12256 816e8 GetStartupInfoA 12367 7781f 12256->12367 12257 8154d __lock 57 API calls 12259 816e7 12257->12259 12259->12256 12260 816fa GetModuleHandleA 12371 8370e 12260->12371 12269 7536b 12268->12269 12270 75341 12268->12270 12269->12231 12271 75350 12270->12271 12272 7536e 12270->12272 12379 76121 HeapAlloc 12271->12379 12272->12231 12275 7535f HeapDestroy 12275->12269 12381 7e72e 12276->12381 12279 71397 12385 711b9 12279->12385 12282 7139f 12283 713b2 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 12282->12283 12284 7141d 12282->12284 12283->12284 12285 713f5 12283->12285 12284->12285 12286 71473 12284->12286 12285->12284 12392 793d2 12285->12392 12287 711b9 59 API calls 12286->12287 12289 71478 12287->12289 12289->12235 12290 71440 12290->12286 12291 71459 GetCurrentThreadId 12290->12291 12291->12289 12293 8157b 12292->12293 12294 81580 12292->12294 12510 71177 12293->12510 12516 71000 12294->12516 12301 79a9c __lock 57 API calls 12300->12301 12302 7f322 12301->12302 12303 7f368 GetStartupInfoA 12302->12303 12306 7f327 12302->12306 12313 7f382 12303->12313 12314 7f46b 12303->12314 12304 7f49a GetStdHandle 12307 7f4a8 GetFileType 12304->12307 12304->12314 12305 7f4fb SetHandleCount 12305->12306 12306->12240 12306->12241 12307->12314 12308 79a9c __lock 57 API calls 12308->12313 12309 7f419 GetFileType 12312 7f3f3 12309->12312 12310 7fe3d __lock GetProcAddress 12310->12312 12311 7fe3d __lock GetProcAddress 12311->12314 12312->12306 12312->12309 12312->12310 12312->12314 12313->12308 12313->12312 12313->12314 12314->12304 12314->12305 12314->12306 12314->12311 12316 8155b 12315->12316 12317 81556 12315->12317 12319 71000 _fast_error_exit 57 API calls 12316->12319 12318 71177 _fast_error_exit 57 API calls 12317->12318 12318->12316 12320 81564 12319->12320 12320->12240 12322 801fd 12321->12322 12323 801de GetEnvironmentStringsW 12321->12323 12324 8028d 12322->12324 12325 801e6 12322->12325 12323->12325 12326 801f2 GetLastError 12323->12326 12327 80299 GetEnvironmentStrings 12324->12327 12330 80295 12324->12330 12328 8021c WideCharToMultiByte 12325->12328 12329 80214 GetEnvironmentStringsW 12325->12329 12326->12322 12327->12330 12331 802a5 12327->12331 12333 80250 12328->12333 12334 80282 FreeEnvironmentStringsW 12328->12334 12329->12328 12329->12330 12344 7a0aa 12330->12344 12335 79a9c __lock 57 API calls 12331->12335 12336 79a9c __lock 57 API calls 12333->12336 12334->12330 12343 802be 12335->12343 12337 80256 12336->12337 12337->12334 12338 8025f WideCharToMultiByte 12337->12338 12340 80279 12338->12340 12341 80270 12338->12341 12339 802d4 FreeEnvironmentStringsA 12339->12330 12340->12334 12342 75518 ___free_lc_time 57 API calls 12341->12342 12342->12340 12343->12339 12345 7a0c1 GetModuleFileNameA 12344->12345 12346 7a0bc 12344->12346 12348 7a0e9 12345->12348 12846 7fdc7 12346->12846 12349 79a9c __lock 57 API calls 12348->12349 12350 7a114 12349->12350 12350->12247 12352 80e0b 12351->12352 12355 80e10 _fast_error_exit 12351->12355 12353 7fdc7 ___initmbctable 61 API calls 12352->12353 12353->12355 12354 79a9c __lock 57 API calls 12360 80e41 _strcat _fast_error_exit 12354->12360 12355->12354 12358 80e1c 12355->12358 12356 80e8a 12357 75518 ___free_lc_time 57 API calls 12356->12357 12357->12358 12358->12252 12358->12253 12359 79a9c __lock 57 API calls 12359->12360 12360->12356 12360->12358 12360->12359 12361 80eaf 12360->12361 12362 75518 ___free_lc_time 57 API calls 12361->12362 12362->12358 12365 715fe 12363->12365 12366 7163a 12365->12366 12888 821c7 12365->12888 12366->12256 12366->12257 12368 7782b 12367->12368 12370 77830 __wincmdln 12367->12370 12369 7fdc7 ___initmbctable 61 API calls 12368->12369 12369->12370 12370->12260 12958 83eb0 12371->12958 12380 7535a 12379->12380 12380->12272 12380->12275 12382 7e737 12381->12382 12384 71393 12382->12384 12399 7fe3d 12382->12399 12384->12279 12384->12282 12389 711c3 12385->12389 12386 7e791 DeleteCriticalSection 12403 75518 12386->12403 12387 7e7a9 12390 7e7bb DeleteCriticalSection 12387->12390 12391 7139c 12387->12391 12389->12386 12389->12387 12390->12387 12391->12235 12398 793de _rand ___free_lc_time 12392->12398 12393 7944b HeapAlloc 12393->12398 12394 7e881 __lock 56 API calls 12394->12398 12395 79477 ___free_lc_time 12395->12290 12396 76948 _rand 5 API calls 12396->12398 12398->12393 12398->12394 12398->12395 12398->12396 12506 7947c 12398->12506 12400 7fe49 ___free_lc_time 12399->12400 12401 7fe6a GetProcAddress 12400->12401 12402 7fe7f ___free_lc_time 12400->12402 12401->12402 12402->12382 12406 75524 ___free_lc_time 12403->12406 12404 75583 ___free_lc_time 12404->12389 12405 75560 12405->12404 12407 75575 HeapFree 12405->12407 12406->12404 12406->12405 12413 7e881 12406->12413 12407->12404 12409 75555 12426 7556b 12409->12426 12410 7553b ___free_lc_time 12410->12409 12420 76194 12410->12420 12414 7e8a7 EnterCriticalSection 12413->12414 12415 7e894 12413->12415 12414->12410 12429 7e7e1 12415->12429 12417 7e89a 12417->12414 12418 8154d __lock 56 API calls 12417->12418 12419 7e8a6 12418->12419 12419->12414 12421 761d1 12420->12421 12425 76477 ___free_lc_time 12420->12425 12422 763bd VirtualFree 12421->12422 12421->12425 12423 76421 12422->12423 12424 76430 VirtualFree HeapFree 12423->12424 12423->12425 12424->12425 12425->12409 12505 7e7cc LeaveCriticalSection 12426->12505 12428 75572 12428->12405 12430 7e7ed ___free_lc_time 12429->12430 12433 7e810 __lock ___free_lc_time 12430->12433 12450 79a9c 12430->12450 12433->12417 12434 7e80b 12453 7a643 12434->12453 12435 7e818 12436 7e881 __lock 57 API calls 12435->12436 12438 7e81f 12436->12438 12439 7e827 12438->12439 12440 7e85f 12438->12440 12442 7fe3d __lock GetProcAddress 12439->12442 12441 75518 ___free_lc_time 57 API calls 12440->12441 12444 7e85b 12441->12444 12443 7e832 12442->12443 12443->12444 12445 7e838 12443->12445 12456 7e878 12444->12456 12447 75518 ___free_lc_time 57 API calls 12445->12447 12448 7e83e 12447->12448 12449 7a643 __lock 57 API calls 12448->12449 12449->12433 12459 79a70 12450->12459 12495 711d6 GetLastError 12453->12495 12455 7a648 12455->12433 12504 7e7cc LeaveCriticalSection 12456->12504 12458 7e87f 12458->12433 12460 79a99 12459->12460 12462 79a77 _rand 12459->12462 12460->12434 12460->12435 12462->12460 12463 799f5 12462->12463 12465 79a01 ___free_lc_time 12463->12465 12464 79a34 12467 79a4f HeapAlloc 12464->12467 12469 79a5e ___free_lc_time 12464->12469 12465->12464 12466 7e881 __lock 56 API calls 12465->12466 12468 79a1c 12466->12468 12467->12469 12473 76948 12468->12473 12469->12462 12475 7697a 12473->12475 12476 769e2 12475->12476 12478 76a9d 12475->12478 12482 764ac 12475->12482 12479 79a67 12476->12479 12478->12476 12490 76563 12478->12490 12494 7e7cc LeaveCriticalSection 12479->12494 12481 79a6e 12481->12464 12483 764f2 HeapAlloc 12482->12483 12484 764be HeapReAlloc 12482->12484 12487 7651d VirtualAlloc 12483->12487 12488 76519 12483->12488 12485 764e1 12484->12485 12486 764dd 12484->12486 12485->12483 12486->12478 12487->12488 12489 76537 HeapFree 12487->12489 12488->12478 12489->12488 12491 76578 VirtualAlloc 12490->12491 12493 765bf 12491->12493 12493->12476 12494->12481 12496 711ec 12495->12496 12497 7123b SetLastError 12496->12497 12498 793d2 _rand 54 API calls 12496->12498 12497->12455 12501 711fe 12498->12501 12499 71233 12500 8154d __lock 54 API calls 12499->12500 12502 7123a 12500->12502 12501->12499 12503 71217 GetCurrentThreadId 12501->12503 12502->12497 12503->12497 12504->12458 12505->12428 12509 7e7cc LeaveCriticalSection 12506->12509 12508 79483 12508->12398 12509->12508 12511 71181 12510->12511 12512 71000 _fast_error_exit 57 API calls 12511->12512 12515 711ae 12511->12515 12513 71198 12512->12513 12514 71000 _fast_error_exit 57 API calls 12513->12514 12514->12515 12515->12294 12522 71026 12516->12522 12517 7112e 12539 77d0c 12517->12539 12519 71133 _fast_error_exit 12523 71148 GetStdHandle WriteFile 12519->12523 12521 71065 12521->12517 12524 71071 GetModuleFileNameA 12521->12524 12522->12517 12522->12519 12522->12521 12523->12517 12525 7108b _strcat _fast_error_exit _strncpy 12524->12525 12532 7b0f2 12525->12532 12527 7159b 12528 715a6 12527->12528 12529 715c0 ExitProcess 12528->12529 12530 715aa GetProcAddress 12528->12530 12530->12529 12531 715ba 12530->12531 12531->12529 12533 7b105 LoadLibraryA 12532->12533 12537 7b172 12532->12537 12534 7b11a GetProcAddress 12533->12534 12533->12537 12535 7b131 GetProcAddress GetProcAddress 12534->12535 12534->12537 12536 7b154 GetProcAddress 12535->12536 12535->12537 12536->12537 12538 7b165 GetProcAddress 12536->12538 12537->12517 12538->12537 12540 7116c 12539->12540 12541 77cdb ___free_lc_time 12539->12541 12540->12527 12545 8335d 12541->12545 12543 77cf4 ExitProcess 12547 8336c ___free_lc_time 12545->12547 12546 8337f 12565 71733 12546->12565 12547->12546 12548 833ce GetModuleFileNameA 12547->12548 12558 833e8 _strcat _fast_error_exit _strncpy 12548->12558 12550 834a4 ___free_lc_time 12551 711d6 _rand 56 API calls 12550->12551 12552 834bb 12551->12552 12553 834ce 12552->12553 12568 84770 12552->12568 12556 834da ___free_lc_time 12553->12556 12576 7c146 12553->12576 12556->12543 12557 83519 _fast_error_exit 12557->12556 12560 79a9c __lock 56 API calls 12557->12560 12562 83566 12557->12562 12563 7b0f2 _fast_error_exit 6 API calls 12558->12563 12559 7c146 ___initmbctable 56 API calls 12561 8358f _strcat 12559->12561 12560->12562 12561->12556 12564 75518 ___free_lc_time 56 API calls 12561->12564 12562->12559 12562->12561 12563->12546 12564->12556 12620 7165f 12565->12620 12567 71740 12567->12550 12569 8477c ___free_lc_time 12568->12569 12570 7e881 __lock 57 API calls 12569->12570 12571 84783 12570->12571 12635 846af 12571->12635 12575 84799 ___free_lc_time 12575->12553 12577 7c152 ___free_lc_time 12576->12577 12578 7c15c LCMapStringW 12577->12578 12581 7c177 12577->12581 12579 7c17f GetLastError 12578->12579 12578->12581 12579->12581 12580 7c39e 12780 7846d GetLocaleInfoA 12580->12780 12581->12580 12582 7c1ca 12581->12582 12584 7c1eb MultiByteToWideChar 12582->12584 12586 7c396 ___free_lc_time 12582->12586 12584->12586 12590 7c219 _fast_error_exit 12584->12590 12586->12557 12587 7c3e1 12786 784b0 12587->12786 12588 7c4cf LCMapStringA 12591 7c4cc 12588->12591 12593 7c278 MultiByteToWideChar 12590->12593 12596 79a9c __lock 46 API calls 12590->12596 12591->12586 12594 75518 ___free_lc_time 46 API calls 12591->12594 12592 7c3f3 12592->12586 12595 7c3fd LCMapStringA 12592->12595 12597 7c295 LCMapStringW 12593->12597 12598 7c37b 12593->12598 12594->12586 12606 7c41c _rand _fast_error_exit 12595->12606 12613 7c497 12595->12613 12600 7c265 12596->12600 12597->12598 12601 7c2b4 12597->12601 12599 7c388 12598->12599 12602 75518 ___free_lc_time 46 API calls 12598->12602 12599->12586 12604 75518 ___free_lc_time 46 API calls 12599->12604 12600->12586 12600->12593 12603 7c2ba 12601->12603 12608 7c2e7 _fast_error_exit 12601->12608 12602->12599 12603->12598 12605 7c2cc LCMapStringW 12603->12605 12604->12586 12605->12598 12612 7c47a LCMapStringA 12606->12612 12616 79a9c __lock 46 API calls 12606->12616 12607 75518 ___free_lc_time 46 API calls 12607->12591 12609 7c342 LCMapStringW 12608->12609 12611 79a9c __lock 46 API calls 12608->12611 12609->12598 12610 7c35a WideCharToMultiByte 12609->12610 12610->12598 12615 7c333 12611->12615 12612->12613 12614 7c49b 12612->12614 12613->12591 12613->12607 12618 784b0 ___initmbctable 46 API calls 12614->12618 12615->12598 12615->12609 12619 7c45f _rand 12616->12619 12618->12613 12619->12612 12619->12613 12621 7166b ___free_lc_time 12620->12621 12622 7e881 __lock 55 API calls 12621->12622 12623 71672 12622->12623 12624 71683 GetCurrentProcess TerminateProcess 12623->12624 12625 71693 _fast_error_exit 12623->12625 12624->12625 12630 7170e 12625->12630 12628 71709 ___free_lc_time 12628->12567 12629 7159b _fast_error_exit 2 API calls 12629->12628 12631 71713 12630->12631 12632 716f6 12630->12632 12634 7e7cc LeaveCriticalSection 12631->12634 12632->12628 12632->12629 12634->12632 12636 711d6 _rand 57 API calls 12635->12636 12637 846b5 12636->12637 12639 8476a 12637->12639 12643 845df 12637->12643 12640 847a2 12639->12640 12779 7e7cc LeaveCriticalSection 12640->12779 12642 847a9 12642->12575 12644 84653 12643->12644 12645 845f2 12643->12645 12648 75518 ___free_lc_time 57 API calls 12644->12648 12649 8467c 12644->12649 12645->12644 12651 8461e 12645->12651 12657 75518 ___free_lc_time 57 API calls 12645->12657 12646 75518 ___free_lc_time 57 API calls 12647 846ab 12646->12647 12647->12639 12650 8466e 12648->12650 12663 846a3 12649->12663 12691 7a339 12649->12691 12654 75518 ___free_lc_time 57 API calls 12650->12654 12658 75518 ___free_lc_time 57 API calls 12651->12658 12666 84641 12651->12666 12652 75518 ___free_lc_time 57 API calls 12655 8464b 12652->12655 12654->12649 12659 75518 ___free_lc_time 57 API calls 12655->12659 12661 84616 12657->12661 12662 84639 12658->12662 12659->12644 12660 75518 ___free_lc_time 57 API calls 12660->12663 12667 7bc9b 12661->12667 12683 7b29b 12662->12683 12663->12646 12666->12652 12668 7bca8 12667->12668 12682 7bd71 12667->12682 12669 7bcc4 12668->12669 12671 75518 ___free_lc_time 57 API calls 12668->12671 12670 7bce1 12669->12670 12672 75518 ___free_lc_time 57 API calls 12669->12672 12673 75518 ___free_lc_time 57 API calls 12670->12673 12677 7bcfe 12670->12677 12671->12669 12672->12670 12673->12677 12674 7bd1b 12675 7bd38 12674->12675 12679 75518 ___free_lc_time 57 API calls 12674->12679 12676 7bd55 12675->12676 12680 75518 ___free_lc_time 57 API calls 12675->12680 12681 75518 ___free_lc_time 57 API calls 12676->12681 12676->12682 12677->12674 12678 75518 ___free_lc_time 57 API calls 12677->12678 12678->12674 12679->12675 12680->12676 12681->12682 12682->12651 12684 7b2a4 12683->12684 12685 7b2f7 12683->12685 12686 7b2be 12684->12686 12688 75518 ___free_lc_time 57 API calls 12684->12688 12685->12666 12687 7b2db 12686->12687 12689 75518 ___free_lc_time 57 API calls 12686->12689 12687->12685 12690 75518 ___free_lc_time 57 API calls 12687->12690 12688->12686 12689->12687 12690->12685 12692 7a4c4 12691->12692 12693 7a346 12691->12693 12692->12660 12694 75518 ___free_lc_time 57 API calls 12693->12694 12695 7a34e 12694->12695 12696 75518 ___free_lc_time 57 API calls 12695->12696 12697 7a356 12696->12697 12698 75518 ___free_lc_time 57 API calls 12697->12698 12699 7a35e 12698->12699 12700 75518 ___free_lc_time 57 API calls 12699->12700 12701 7a366 12700->12701 12702 75518 ___free_lc_time 57 API calls 12701->12702 12703 7a36e 12702->12703 12704 75518 ___free_lc_time 57 API calls 12703->12704 12705 7a376 12704->12705 12706 75518 ___free_lc_time 57 API calls 12705->12706 12707 7a37d 12706->12707 12708 75518 ___free_lc_time 57 API calls 12707->12708 12709 7a385 12708->12709 12710 75518 ___free_lc_time 57 API calls 12709->12710 12711 7a38d 12710->12711 12712 75518 ___free_lc_time 57 API calls 12711->12712 12713 7a395 12712->12713 12714 75518 ___free_lc_time 57 API calls 12713->12714 12715 7a39d 12714->12715 12716 75518 ___free_lc_time 57 API calls 12715->12716 12717 7a3a5 12716->12717 12718 75518 ___free_lc_time 57 API calls 12717->12718 12719 7a3ad 12718->12719 12720 75518 ___free_lc_time 57 API calls 12719->12720 12721 7a3b5 12720->12721 12722 75518 ___free_lc_time 57 API calls 12721->12722 12723 7a3bd 12722->12723 12724 75518 ___free_lc_time 57 API calls 12723->12724 12725 7a3c5 12724->12725 12726 75518 ___free_lc_time 57 API calls 12725->12726 12727 7a3d0 12726->12727 12728 75518 ___free_lc_time 57 API calls 12727->12728 12729 7a3d8 12728->12729 12730 75518 ___free_lc_time 57 API calls 12729->12730 12731 7a3e0 12730->12731 12732 75518 ___free_lc_time 57 API calls 12731->12732 12733 7a3e8 12732->12733 12734 75518 ___free_lc_time 57 API calls 12733->12734 12735 7a3f0 12734->12735 12736 75518 ___free_lc_time 57 API calls 12735->12736 12737 7a3f8 12736->12737 12738 75518 ___free_lc_time 57 API calls 12737->12738 12739 7a400 12738->12739 12740 75518 ___free_lc_time 57 API calls 12739->12740 12741 7a408 12740->12741 12742 75518 ___free_lc_time 57 API calls 12741->12742 12743 7a410 12742->12743 12744 75518 ___free_lc_time 57 API calls 12743->12744 12745 7a418 12744->12745 12746 75518 ___free_lc_time 57 API calls 12745->12746 12747 7a420 12746->12747 12748 75518 ___free_lc_time 57 API calls 12747->12748 12749 7a428 12748->12749 12750 75518 ___free_lc_time 57 API calls 12749->12750 12751 7a430 12750->12751 12752 75518 ___free_lc_time 57 API calls 12751->12752 12753 7a438 12752->12753 12754 75518 ___free_lc_time 57 API calls 12753->12754 12755 7a440 12754->12755 12756 75518 ___free_lc_time 57 API calls 12755->12756 12757 7a448 12756->12757 12758 75518 ___free_lc_time 57 API calls 12757->12758 12759 7a456 12758->12759 12760 75518 ___free_lc_time 57 API calls 12759->12760 12761 7a461 12760->12761 12762 75518 ___free_lc_time 57 API calls 12761->12762 12763 7a46c 12762->12763 12764 75518 ___free_lc_time 57 API calls 12763->12764 12765 7a477 12764->12765 12766 75518 ___free_lc_time 57 API calls 12765->12766 12767 7a482 12766->12767 12768 75518 ___free_lc_time 57 API calls 12767->12768 12769 7a48d 12768->12769 12770 75518 ___free_lc_time 57 API calls 12769->12770 12771 7a498 12770->12771 12772 75518 ___free_lc_time 57 API calls 12771->12772 12773 7a4a3 12772->12773 12774 75518 ___free_lc_time 57 API calls 12773->12774 12775 7a4ae 12774->12775 12776 75518 ___free_lc_time 57 API calls 12775->12776 12777 7a4b9 12776->12777 12778 75518 ___free_lc_time 57 API calls 12777->12778 12778->12692 12779->12642 12781 78497 12780->12781 12782 7849c 12780->12782 12784 77d0c _fast_error_exit 56 API calls 12781->12784 12812 77f47 12782->12812 12785 784ae 12784->12785 12785->12586 12785->12587 12785->12588 12787 784bc ___free_lc_time 12786->12787 12788 784e3 GetCPInfo 12787->12788 12804 785f3 12787->12804 12789 784f4 12788->12789 12791 78507 _fast_error_exit 12788->12791 12790 784fa GetCPInfo 12789->12790 12789->12791 12790->12791 12794 7853b MultiByteToWideChar 12791->12794 12797 78555 _rand _fast_error_exit 12791->12797 12792 75518 ___free_lc_time 50 API calls 12793 785ad 12792->12793 12795 77d0c _fast_error_exit 50 API calls 12793->12795 12794->12793 12794->12797 12796 78673 ___free_lc_time 12795->12796 12796->12592 12798 785bb MultiByteToWideChar 12797->12798 12799 793d2 _rand 50 API calls 12797->12799 12800 785d6 12798->12800 12798->12804 12801 785a5 12799->12801 12802 785fb 12800->12802 12803 785db WideCharToMultiByte 12800->12803 12801->12793 12801->12798 12805 78616 12802->12805 12806 78600 WideCharToMultiByte 12802->12806 12803->12804 12804->12792 12804->12793 12807 793d2 _rand 50 API calls 12805->12807 12806->12804 12806->12805 12808 7861e 12807->12808 12808->12804 12809 78627 WideCharToMultiByte 12808->12809 12809->12804 12810 7863b 12809->12810 12811 75518 ___free_lc_time 50 API calls 12810->12811 12811->12804 12813 711d6 _rand 57 API calls 12812->12813 12814 77f4e 12813->12814 12815 84770 _fast_error_exit 57 API calls 12814->12815 12816 77f5e 12814->12816 12815->12816 12818 77f8c 12816->12818 12819 85551 12816->12819 12818->12781 12820 8556f 12819->12820 12822 85566 12819->12822 12823 7eb18 12820->12823 12822->12816 12824 7eb24 ___free_lc_time 12823->12824 12825 7eb46 12824->12825 12826 7eb2e GetStringTypeW 12824->12826 12828 7ec5b 12825->12828 12829 7eb79 12825->12829 12826->12825 12827 7eb4e GetLastError 12826->12827 12827->12825 12830 7846d ___initmbctable 51 API calls 12828->12830 12831 7eb95 MultiByteToWideChar 12829->12831 12838 7ec55 ___free_lc_time 12829->12838 12832 7ec7b 12830->12832 12831->12838 12840 7ebc3 _rand _fast_error_exit 12831->12840 12833 7eca7 GetStringTypeA 12832->12833 12834 784b0 ___initmbctable 51 API calls 12832->12834 12832->12838 12835 7ecc0 12833->12835 12833->12838 12837 7ec9b 12834->12837 12836 75518 ___free_lc_time 51 API calls 12835->12836 12836->12838 12837->12833 12837->12838 12838->12822 12839 7ec21 MultiByteToWideChar 12842 7ec49 12839->12842 12843 7ec38 GetStringTypeW 12839->12843 12840->12839 12841 793d2 _rand 51 API calls 12840->12841 12844 7ec12 12841->12844 12842->12838 12845 75518 ___free_lc_time 51 API calls 12842->12845 12843->12842 12844->12838 12844->12839 12845->12838 12847 7fdd7 12846->12847 12848 7fdd0 12846->12848 12847->12345 12850 7fc77 12848->12850 12851 7fc83 ___free_lc_time 12850->12851 12852 7e881 __lock 57 API calls 12851->12852 12853 7fc8e 12852->12853 12854 7fcb4 12853->12854 12855 7fca2 GetOEMCP 12853->12855 12856 7fccb 12854->12856 12857 7fcb9 GetACP 12854->12857 12855->12856 12858 7fda6 12856->12858 12859 7fd09 12856->12859 12860 79a9c __lock 57 API calls 12856->12860 12857->12856 12874 7fdbe 12858->12874 12864 7fd1b 12859->12864 12866 7fae7 12859->12866 12860->12859 12862 7fdb5 ___free_lc_time 12862->12847 12864->12858 12865 75518 ___free_lc_time 57 API calls 12864->12865 12865->12858 12867 7fb05 12866->12867 12872 7fb30 ___initmbctable 12866->12872 12868 7fb1c GetCPInfo 12867->12868 12867->12872 12868->12872 12870 7fc63 12871 77d0c _fast_error_exit 57 API calls 12870->12871 12873 7fc75 12871->12873 12872->12870 12877 7f8ec GetCPInfo 12872->12877 12873->12864 12887 7e7cc LeaveCriticalSection 12874->12887 12876 7fdc5 12876->12862 12878 7f9de 12877->12878 12879 7f91c 12877->12879 12882 77d0c _fast_error_exit 57 API calls 12878->12882 12880 7eb18 ___initmbctable 57 API calls 12879->12880 12881 7f992 12880->12881 12883 7c146 ___initmbctable 57 API calls 12881->12883 12884 7fa76 12882->12884 12885 7f9b6 12883->12885 12884->12870 12886 7c146 ___initmbctable 57 API calls 12885->12886 12886->12878 12887->12876 12891 8218f 12888->12891 12890 821d0 12890->12366 12892 8219b ___free_lc_time 12891->12892 12899 715cb 12892->12899 12898 821b8 ___free_lc_time 12898->12890 12900 7e881 __lock 57 API calls 12899->12900 12901 715d2 12900->12901 12902 820e7 12901->12902 12912 7970b 12902->12912 12904 820f3 12908 82135 12904->12908 12920 7789a 12904->12920 12906 82120 12907 7789a 60 API calls 12906->12907 12906->12908 12907->12908 12909 821c1 12908->12909 12946 715d4 12909->12946 12913 79717 ___free_lc_time 12912->12913 12914 7975a HeapSize 12913->12914 12915 7e881 __lock 57 API calls 12913->12915 12916 7976d ___free_lc_time 12914->12916 12917 79727 ___free_lc_time 12915->12917 12916->12904 12938 79778 12917->12938 12921 778a6 ___free_lc_time 12920->12921 12922 778af 12921->12922 12923 778bd 12921->12923 12926 79a9c __lock 57 API calls 12922->12926 12924 778c4 12923->12924 12925 778d0 12923->12925 12927 75518 ___free_lc_time 57 API calls 12924->12927 12931 77a0b _rand 12925->12931 12936 778dd ___sbh_resize_block _rand ___free_lc_time 12925->12936 12928 778b7 ___free_lc_time 12926->12928 12927->12928 12928->12906 12929 77a19 HeapReAlloc 12929->12931 12930 7e881 __lock 57 API calls 12930->12936 12931->12928 12931->12929 12933 77969 HeapAlloc 12933->12936 12934 779bf HeapReAlloc 12934->12936 12935 76948 _rand 5 API calls 12935->12936 12936->12928 12936->12930 12936->12933 12936->12934 12936->12935 12937 76194 VirtualFree VirtualFree HeapFree ___free_lc_time 12936->12937 12942 77a02 12936->12942 12937->12936 12941 7e7cc LeaveCriticalSection 12938->12941 12940 79754 12940->12914 12940->12916 12941->12940 12945 7e7cc LeaveCriticalSection 12942->12945 12944 77a09 12944->12936 12945->12944 12949 7e7cc LeaveCriticalSection 12946->12949 12948 715db 12948->12898 12949->12948 13117 83650 12958->13117 12961 83edf 13118 83640 GetCurrentThreadId 13117->13118 13118->12961

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 7fe3d-7fe50 call 804c0 3 7fe52-7fe59 0->3 4 7fe89-7fe90 0->4 5 7fe7f-7fe84 3->5 6 7fe5b-7fe68 3->6 7 7fe95-7fec7 call 804fb 4->7 5->4 6->5 10 7fe6a-7fe7d GetProcAddress 6->10 10->4 10->5
        APIs
        • GetModuleHandleA.KERNEL32(kernel32.dll,000E68D8,00000010,0007E759,00000000,00000FA0,76230A60,00000000,00071393,00081676,?,000E6F30,00000060), ref: 0007FE60
        • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionAndSpinCount), ref: 0007FE70
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: AddressHandleModuleProc
        • String ID: InitializeCriticalSectionAndSpinCount$`#v$kernel32.dll
        • API String ID: 1646373207-1060584518
        • Opcode ID: 4b3ed82881ca11208637f543533899a69845e0ab14a47a323e462dc9dc041c65
        • Instruction ID: d782d9a057071c4eb6cd8b5d152a04ac8cfd6e29b82e7b9281fbbc898b1e35cf
        • Opcode Fuzzy Hash: 4b3ed82881ca11208637f543533899a69845e0ab14a47a323e462dc9dc041c65
        • Instruction Fuzzy Hash: 7CF09070940346AEEB60AFA1EC0DA6936A4BB54740B148124A128A61F2DB3DD640EB18

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 13 75321-7533f HeapCreate 14 75341-7534e call 75307 13->14 15 7536b-7536d 13->15 18 75350-7535d call 76121 14->18 19 7536e-75371 14->19 18->19 22 7535f-75365 HeapDestroy 18->22 22->15
        APIs
        • HeapCreate.KERNELBASE(00000000,00001000,00000000,00081664,00000001,?,000E6F30,00000060), ref: 00075332
          • Part of subcall function 00076121: HeapAlloc.KERNEL32(00000000,00000140,0007535A,000003F8,?,000E6F30,00000060), ref: 0007612E
        • HeapDestroy.KERNEL32(?,000E6F30,00000060), ref: 00075365
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: Heap$AllocCreateDestroy
        • String ID:
        • API String ID: 2236781399-0
        • Opcode ID: 34687259a38d4ed0ef743a0c118afcf7e96f288a12c0045829a40043a07fad4c
        • Instruction ID: 5b36d8269d99b3e75e302ca63aeb36f079890a7db702aad4512730628fa7a1e2
        • Opcode Fuzzy Hash: 34687259a38d4ed0ef743a0c118afcf7e96f288a12c0045829a40043a07fad4c
        • Instruction Fuzzy Hash: A7E0D830E48B02AAEB106B705D0576939D4FB40783F148539F05AD50F4EBF8C680EB45

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 32 7b0f2-7b103 33 7b105-7b114 LoadLibraryA 32->33 34 7b172-7b179 32->34 37 7b1ad-7b1af 33->37 38 7b11a-7b12f GetProcAddress 33->38 35 7b1b7-7b1be 34->35 36 7b17b-7b17f 34->36 40 7b1d6-7b1df 35->40 41 7b1c0-7b1c6 35->41 47 7b181-7b196 36->47 48 7b19e-7b1a5 36->48 39 7b1e6-7b1ea 37->39 38->37 42 7b131-7b152 GetProcAddress * 2 38->42 40->39 41->40 49 7b1c8-7b1cf 41->49 42->34 43 7b154-7b163 GetProcAddress 42->43 43->34 46 7b165-7b16d GetProcAddress 43->46 46->34 47->48 54 7b198-7b19c 47->54 50 7b1a7-7b1ab 48->50 51 7b1b1-7b1b5 48->51 49->40 52 7b1d1-7b1d4 49->52 50->40 51->40 52->40 54->35 54->48
        APIs
        • LoadLibraryA.KERNEL32(user32.dll,000E60F0,?,?), ref: 0007B10A
        • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 0007B126
        • GetProcAddress.KERNEL32(00000000,GetActiveWindow), ref: 0007B137
        • GetProcAddress.KERNEL32(00000000,GetLastActivePopup), ref: 0007B144
        • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 0007B15A
        • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 0007B16B
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: AddressProc$LibraryLoad
        • String ID: GetActiveWindow$GetLastActivePopup$GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$user32.dll
        • API String ID: 2238633743-1612076079
        • Opcode ID: cca90460177e211d2bc1d292868e81e174b2465f57a9d3cb9655b4d13e4c9037
        • Instruction ID: c88212032ca38cb6f312a1e5c18b5c9ed02826f9157c6a9940a96b292e235f7f
        • Opcode Fuzzy Hash: cca90460177e211d2bc1d292868e81e174b2465f57a9d3cb9655b4d13e4c9037
        • Instruction Fuzzy Hash: 1F21A531F00385AAEB519F75DC9DB3B3AE8AB14740BC4842DA905D34A0EB7DDA00DB65

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 534 81596-815e8 call 804c0 call 78100 GetVersionExA 539 815ea-815f0 534->539 540 815f6-81610 GetModuleHandleA 534->540 539->540 541 81631-81634 540->541 542 81612-8161d 540->542 544 8165d-81667 call 75321 541->544 542->541 543 8161f-81628 542->543 546 81649-8164d 543->546 547 8162a-8162f 543->547 552 81669-81670 call 81572 544->552 553 81671 call 7138e 544->553 546->541 548 8164f-81651 546->548 547->541 550 81636-8163d 547->550 551 81657-8165a 548->551 550->541 554 8163f-81647 550->554 551->544 552->553 558 81676-81678 553->558 554->551 559 8167a-81681 call 81572 558->559 560 81682-81691 call 7c596 call 7f313 558->560 559->560 567 8169b-816b7 GetCommandLineA call 801c2 call 7a0aa 560->567 568 81693-8169a call 8154d 560->568 575 816b9-816c0 call 8154d 567->575 576 816c1-816c8 call 80dfe 567->576 568->567 575->576 581 816ca-816d1 call 8154d 576->581 582 816d2-816df call 715f5 576->582 581->582 587 816e8-81701 GetStartupInfoA call 7781f 582->587 588 816e1-816e7 call 8154d 582->588 593 81709-8170b 587->593 594 81703-81707 587->594 588->587 595 8170c-81722 GetModuleHandleA call 8370e 593->595 594->595 598 8172a-8176a call 71744 call 804fb 595->598 599 81724-81725 call 71722 595->599 599->598
        APIs
        • GetVersionExA.KERNEL32(?,000E6F30,00000060), ref: 000815B6
        • GetModuleHandleA.KERNEL32(00000000,?,000E6F30,00000060), ref: 00081609
        • _fast_error_exit.LIBCMT ref: 0008166B
        • _fast_error_exit.LIBCMT ref: 0008167C
        • GetCommandLineA.KERNEL32(?,000E6F30,00000060), ref: 0008169B
        • GetStartupInfoA.KERNEL32(?), ref: 000816EF
        • __wincmdln.LIBCMT ref: 000816F5
        • GetModuleHandleA.KERNEL32(00000000,00000000,?,0000000A), ref: 00081712
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: HandleModule_fast_error_exit$CommandInfoLineStartupVersion__wincmdln
        • String ID: `#v
        • API String ID: 3897392166-272240289
        • Opcode ID: 71c8a95b6e56dc900321f0bfebf4d291456cf5f8fe8f5d05a0377e78c4efede6
        • Instruction ID: 8bbf54397037834bd24f57d9499cf701d4e2d14851b4c70e87fa592d51edf297
        • Opcode Fuzzy Hash: 71c8a95b6e56dc900321f0bfebf4d291456cf5f8fe8f5d05a0377e78c4efede6
        • Instruction Fuzzy Hash: 47419170D00711CADB60BB7498096ED77E8BF44710F248829F4D9AB192EA78D993DB94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1130 7eee8-7ef33 call 804c0 call 7e881 call 835b9 1137 7eff1-7eff8 1130->1137 1138 7ef39-7ef3c 1130->1138 1139 7f007-7f015 GetTimeZoneInformation 1137->1139 1140 7effa-7f001 call 75518 1137->1140 1138->1137 1141 7ef42-7ef49 1138->1141 1143 7f0ec-7f0f9 call 79e6e 1139->1143 1144 7f01b-7f038 1139->1144 1140->1139 1145 7ef6c-7ef82 call 80100 call 79a9c 1141->1145 1146 7ef4b-7ef56 call 7d5e0 1141->1146 1162 7f18a-7f18f call 804fb 1143->1162 1150 7f04a-7f051 1144->1150 1151 7f03a-7f045 1144->1151 1145->1143 1172 7ef88-7efba call 7cb30 call 7f103 call 76c80 1145->1172 1146->1143 1158 7ef5c-7ef63 1146->1158 1154 7f053-7f05a 1150->1154 1155 7f072-7f078 1150->1155 1151->1150 1154->1155 1159 7f05c-7f070 1154->1159 1160 7f07e-7f09e WideCharToMultiByte 1155->1160 1158->1145 1163 7ef65-7ef6b call 75518 1158->1163 1159->1160 1164 7f0b0-7f0b5 1160->1164 1165 7f0a0-7f0a3 1160->1165 1163->1145 1171 7f0b8-7f0d2 WideCharToMultiByte 1164->1171 1165->1164 1169 7f0a5-7f0ae 1165->1169 1169->1171 1174 7f0e4-7f0e9 1171->1174 1175 7f0d4-7f0d7 1171->1175 1183 7efc4-7efd6 call 77f47 1172->1183 1184 7efbc-7efc3 1172->1184 1174->1143 1175->1174 1177 7f0d9-7f0e2 1175->1177 1177->1143 1187 7efd8-7efdc 1183->1187 1184->1183 1188 7efee-7efef 1187->1188 1189 7efde-7efe0 1187->1189 1188->1187 1190 7efe6-7efe8 1189->1190 1191 7f10c-7f10f 1189->1191 1190->1188 1190->1191 1192 7f111-7f122 call 77f47 1191->1192 1193 7f14f-7f152 1191->1193 1201 7f129-7f12d 1192->1201 1195 7f154 1193->1195 1196 7f15a-7f164 1193->1196 1195->1196 1197 7f166-7f180 call 76c80 1196->1197 1198 7f182-7f187 1196->1198 1197->1162 1198->1162 1203 7f124-7f126 1201->1203 1204 7f12f-7f132 1201->1204 1203->1204 1205 7f128 1203->1205 1204->1193 1206 7f134-7f142 call 77f47 1204->1206 1205->1201 1209 7f149-7f14d 1206->1209 1209->1193 1210 7f144-7f146 1209->1210 1210->1193 1211 7f148 1210->1211 1211->1209
        APIs
        • __lock.LIBCMT ref: 0007EEFB
          • Part of subcall function 0007E881: EnterCriticalSection.KERNEL32(?,?,?,0007553B,00000004,000E5FB8,0000000C,0007E79A,00000000,?,00071478,?,000E6F30,00000060), ref: 0007E8A9
        • _strcat.LIBCMT ref: 0007EF8A
        • _strncpy.LIBCMT ref: 0007EFA3
          • Part of subcall function 00075518: __lock.LIBCMT ref: 00075536
          • Part of subcall function 00075518: HeapFree.KERNEL32(00000000,?,000E5FB8,0000000C,0007E79A,00000000,?,00071478,?,000E6F30,00000060), ref: 0007557D
        • GetTimeZoneInformation.KERNEL32(000FE67C,000E71C8,00000018,0007F1BE,000E71D8,00000008,0007D0D2), ref: 0007F00C
        • WideCharToMultiByte.KERNEL32(00000000,00000000,000FE680,000000FF,0000003F,00000000,?), ref: 0007F09A
        • WideCharToMultiByte.KERNEL32(00000000,00000000,000FE6D4,000000FF,0000003F,00000000,?), ref: 0007F0CE
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: ByteCharMultiWide__lock$CriticalEnterFreeHeapInformationSectionTimeZone_strcat_strncpy
        • String ID:
        • API String ID: 2250874180-0
        • Opcode ID: 31f2e7fe82b2b5de968947733bce968ddcf87a0f04a2a158cd7e86d09a6e6f73
        • Instruction ID: e496289ba807e71a44b58fb6805895ce799a5f1a76fddcd37659c67ca3226071
        • Opcode Fuzzy Hash: 31f2e7fe82b2b5de968947733bce968ddcf87a0f04a2a158cd7e86d09a6e6f73
        • Instruction Fuzzy Hash: E0713B30D04282AEE765AB28EC01BB5BBE5E715350F74C16AE698C76B2D73C4881CB59
        APIs
        • VirtualQuery.KERNEL32(?,?,0000001C), ref: 0007177C
        • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0007178D
        • VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C), ref: 000717D3
        • VirtualAlloc.KERNEL32(?,?,00001000,00000004,?,?,0000001C), ref: 00071811
        • VirtualProtect.KERNEL32(?,?,00000002,?,?,?,0000001C), ref: 00071837
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: Virtual$Query$AllocInfoProtectSystem
        • String ID:
        • API String ID: 4136887677-0
        • Opcode ID: 2856887ff5deca205fded5e99ac677954652cbd90bbdbba7b3a39feac4c4d4bf
        • Instruction ID: 01f415028a6571e9ca7bee99c0b100c897064b0f6e7aa4a5b24e673167875668
        • Opcode Fuzzy Hash: 2856887ff5deca205fded5e99ac677954652cbd90bbdbba7b3a39feac4c4d4bf
        • Instruction Fuzzy Hash: 7231C332D04219EBDF20CFA8DC89AEDBBB8EB04710F148165E945E7190DB38DE41DB94
        APIs
        • LoadLibraryA.KERNEL32(?,?,?,?,00081433), ref: 0007DB67
        • GetProcAddress.KERNEL32(00000000,?), ref: 0007DB71
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: AddressLibraryLoadProc
        • String ID:
        • API String ID: 2574300362-0
        • Opcode ID: 5a09dc29ed97c0e7633c318b25a77ee8724ef662057f26c237208de7d9c665bd
        • Instruction ID: 978d73893e7dbcf4134efac010f1ce3b3209805db6728794b7c98efe536b3329
        • Opcode Fuzzy Hash: 5a09dc29ed97c0e7633c318b25a77ee8724ef662057f26c237208de7d9c665bd
        • Instruction Fuzzy Hash: F0514A75A04280CFE718CF28EC845697BF2FF88314F15852AE84997B61C738A941EF81
        APIs
        • GetLocaleInfoA.KERNEL32(?,00001004,?,00000006), ref: 0007848D
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: InfoLocale
        • String ID:
        • API String ID: 2299586839-0
        • Opcode ID: 4d79bc3eef71ff87657c19f124961f2ab59df5a26c7a62242eec04ebbe550a44
        • Instruction ID: 84c67808acccf9e334bc7704cbc94afae5e6f9611d6c422ebbad34bf35274451
        • Opcode Fuzzy Hash: 4d79bc3eef71ff87657c19f124961f2ab59df5a26c7a62242eec04ebbe550a44
        • Instruction Fuzzy Hash: FEE09230E48208BBDB11DBA4DD05BDD7BB86F04324F10C2A5F61CDA1C1EBB4DA008759
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1f53be4966a4236c17d9a3db5d526e57aa0c53ebd156c4e495a1da7b2482d113
        • Instruction ID: 50d0c315cea60367cffb02529d54229110dac260836ed06b7823d6a4c06069fa
        • Opcode Fuzzy Hash: 1f53be4966a4236c17d9a3db5d526e57aa0c53ebd156c4e495a1da7b2482d113
        • Instruction Fuzzy Hash: 1F218672900204DBCB14EF68C8819ABBBA9FF85750B45C568E9599B246DB30FA15C7E0
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 9a2926ecaae9c02c98bff142c9d937081e804562fe089b5cd7e9810069b52322
        • Instruction ID: c52125e899334c5666b6e0a49c2d79cfe527d02f11d9590fce1b09a906654fea
        • Opcode Fuzzy Hash: 9a2926ecaae9c02c98bff142c9d937081e804562fe089b5cd7e9810069b52322
        • Instruction Fuzzy Hash: FE210835A042818FE718CF29EC846697BE2FFCC310F16812ED849D7B65D678A845EB81
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 3abceb86a2e80372f29956a0c928d5b83b0ea29cd75e5213236b8f7da63a9200
        • Instruction ID: 2c7375f913755082feaf4badc1d172a0187ffd7b3494f5469dab8b9e24c2b717
        • Opcode Fuzzy Hash: 3abceb86a2e80372f29956a0c928d5b83b0ea29cd75e5213236b8f7da63a9200
        • Instruction Fuzzy Hash: 9BF0657540D6958FDB299F604CD09C93B76AF02245B1AD4DAD44A0E0A3D26C4A09DB25

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 56 7138e call 7e72e 58 71393-71395 56->58 59 71397-7139e call 711b9 58->59 60 7139f-713b0 58->60 64 713b2-713f3 GetProcAddress * 4 60->64 65 7141d-71430 60->65 64->65 66 713f5-71418 64->66 68 71473-71478 call 711b9 65->68 69 71432-71446 call 793d2 65->69 66->65 74 7147a-7147c 68->74 69->68 75 71448-71457 69->75 75->68 77 71459-71471 GetCurrentThreadId 75->77 77->74
        APIs
        • GetModuleHandleA.KERNEL32(kernel32.dll,76230A60,00000000,00081676,?,000E6F30,00000060), ref: 000713A6
        • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 000713BE
        • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 000713CB
        • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 000713D8
        • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 000713E5
        • GetCurrentThreadId.KERNEL32 ref: 00071463
          • Part of subcall function 000711B9: DeleteCriticalSection.KERNEL32(00000000,00000000,00000000,?,00071478,?,000E6F30,00000060), ref: 0007E792
          • Part of subcall function 000711B9: DeleteCriticalSection.KERNEL32(00000004,00000000,?,00071478,?,000E6F30,00000060), ref: 0007E7BC
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: AddressProc$CriticalDeleteSection$CurrentHandleModuleThread
        • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$`#v$kernel32.dll
        • API String ID: 3190854022-141970118
        • Opcode ID: 1f5372fa5e9db1368ad8d5ad4ac25a154221d6eeb19ddbe9a8f1454b6720ca39
        • Instruction ID: 3a94f6cb5fc312d2153e906696a036f80cab37c43dd7210600ae769d420e1356
        • Opcode Fuzzy Hash: 1f5372fa5e9db1368ad8d5ad4ac25a154221d6eeb19ddbe9a8f1454b6720ca39
        • Instruction Fuzzy Hash: B92192B1E093889AE7605F3AFC09D663FE4FB617903108529E068DB6F0DBBC8441DB55

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 78 8335d-8337d call 804c0 81 8339e-833a2 78->81 82 8337f-83390 78->82 83 833ba-833c9 81->83 84 833a4-833b8 81->84 90 8349d-834c7 call 71733 call 804c0 call 711d6 82->90 86 833ce-833e6 GetModuleFileNameA 83->86 84->86 88 833e8-833fa call 7cb30 86->88 89 833fb-83410 call 80100 86->89 88->89 97 83412-83434 call 80100 call 76c80 89->97 98 83437-8349a call 80100 call 78100 call 7cb30 call 7cb40 * 5 call 7b0f2 89->98 112 834c9-834d0 call 84770 90->112 113 834d3-834d8 90->113 97->98 98->90 112->113 114 834da-834e1 113->114 115 83502-83521 call 7c146 113->115 118 835b0-835b8 call 804fb 114->118 119 834e7-834ec 114->119 130 835ad 115->130 131 83527-8355c call 78100 115->131 123 834f8-834fb 119->123 124 834ee-834f1 119->124 123->119 129 834fd 123->129 124->123 128 834f3-834f6 124->128 128->123 129->118 130->118 140 8355e-83572 call 79a9c 131->140 141 83574-83594 call 7c146 131->141 140->141 149 835a1-835a4 140->149 141->149 151 83596-835a0 call 7cb30 141->151 149->130 154 835a6-835ac call 75518 149->154 151->149 154->130
        APIs
        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,000E62A8,00000118,00077CF4,00000001,00000000,000E60B0,00000008,0007116C,00000000,00000000,00000000), ref: 000833DE
        • _strcat.LIBCMT ref: 000833F4
        • _strncpy.LIBCMT ref: 0008342F
        • _strcat.LIBCMT ref: 00083454
          • Part of subcall function 0007C146: LCMapStringW.KERNEL32(00000000,00000100,000E6304,00000001,00000000,00000000,000E62E0,00000038,00083519,?,00000200,?,000000FF,00000000,00000000,?), ref: 0007C16D
          • Part of subcall function 0007C146: MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,000E62E0,00000038,00083519,?,00000200,?,000000FF,00000000,00000000,?), ref: 0007C206
          • Part of subcall function 0007C146: MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0007C287
          • Part of subcall function 0007C146: LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 0007C2A1
        • _strcat.LIBCMT ref: 0008359A
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: _strcat$ByteCharMultiStringWide$FileModuleName_strncpy
        • String ID: ...$<program name unknown>$Buffer overrun detected!$Microsoft Visual C++ Runtime Library$Program: $Unknown security failure detected!
        • API String ID: 4156849676-1673886896
        • Opcode ID: 8a53c9e70790236d31418f81687c83a93519c52cc3dd9654f7ebd0fd826e70e3
        • Instruction ID: 3ab841e9040fcddd2c568aa7726aad9a1ebf354e9906d9173f9b329a72cd75a6
        • Opcode Fuzzy Hash: 8a53c9e70790236d31418f81687c83a93519c52cc3dd9654f7ebd0fd826e70e3
        • Instruction Fuzzy Hash: C7511472D00654AFEF21BB64DC42EDE7BA4BF44720F104119F598AB283DB39DB808B95

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 391 71000-71024 392 71026-7102d 391->392 393 71035-71040 392->393 394 7102f-71033 392->394 395 71046-7104e 393->395 396 7115b-71176 call 77d0c 393->396 394->392 394->393 398 71054-71056 395->398 399 71133-71155 call 80100 GetStdHandle WriteFile 395->399 401 71065-7106b 398->401 402 71058-7105f 398->402 399->396 401->396 405 71071-71089 GetModuleFileNameA 401->405 402->399 402->401 406 7109b-710ab call 80100 405->406 407 7108b-7109a call 7cb30 405->407 412 710cf-71131 call 80100 * 2 call 78100 call 7cb30 call 7cb40 * 3 call 7b0f2 406->412 413 710ad-710cc call 80100 call 76c80 406->413 407->406 412->396 413->412
        APIs
        • GetModuleFileNameA.KERNEL32(00000000,?,00000104,00000000,00000000,00000000), ref: 00071081
        • _strcat.LIBCMT ref: 00071094
        • _strncpy.LIBCMT ref: 000710C7
        • _strcat.LIBCMT ref: 000710FB
        • GetStdHandle.KERNEL32(000000F4,000E6E90,00000000,?,00000000,00000000,00000000,00000000), ref: 0007114E
        • WriteFile.KERNEL32(00000000), ref: 00071155
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: File_strcat$HandleModuleNameWrite_strncpy
        • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
        • API String ID: 3279267778-4022980321
        • Opcode ID: 80dc1867ad5093a59418e513bfd95792dfa371f64e49c063eb47e4729de1c418
        • Instruction ID: 8d49498bab3fb0a7961220dc5e6361e8e96d535e37ca46b9ba746c24936b978c
        • Opcode Fuzzy Hash: 80dc1867ad5093a59418e513bfd95792dfa371f64e49c063eb47e4729de1c418
        • Instruction Fuzzy Hash: 32314832D002049AEB35BB78DC86EEE37A9FB44320F10841AF599D6193DE79D6848B58

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 434 7c146-7c15a call 804c0 438 7c194-7c197 434->438 439 7c15c-7c175 LCMapStringW 434->439 442 7c1b4-7c1bc 438->442 443 7c199-7c19c 438->443 440 7c177-7c17d 439->440 441 7c17f-7c188 GetLastError 439->441 440->438 441->438 445 7c18a 441->445 446 7c1c2-7c1c4 442->446 447 7c39e-7c3a9 442->447 444 7c19f-7c1a2 443->444 448 7c1a4-7c1a7 444->448 449 7c1ac-7c1b1 444->449 445->438 446->447 452 7c1ca-7c1cd 446->452 450 7c3b3-7c3b6 447->450 451 7c3ab-7c3b0 447->451 448->444 455 7c1a9 448->455 449->442 456 7c3c0-7c3cf call 7846d 450->456 457 7c3b8-7c3bd 450->457 451->450 453 7c1d3-7c1e1 452->453 454 7c3d1-7c3d3 452->454 459 7c1e3-7c1e8 453->459 460 7c1eb-7c213 MultiByteToWideChar 453->460 461 7c4f9-7c501 call 804fb 454->461 455->449 456->454 465 7c3d8-7c3db 456->465 457->456 459->460 460->454 463 7c219-7c25a call 78100 460->463 477 7c25c-7c26b call 79a9c 463->477 478 7c278-7c28f MultiByteToWideChar 463->478 468 7c3e1-7c3fb call 784b0 465->468 469 7c4cf-7c4e7 LCMapStringA 465->469 468->454 480 7c3fd-7c416 LCMapStringA 468->480 473 7c4e9-7c4ec 469->473 474 7c4f7 473->474 475 7c4ee-7c4f6 call 75518 473->475 474->461 475->474 477->454 496 7c271 477->496 482 7c295-7c2ae LCMapStringW 478->482 483 7c37b-7c37e 478->483 487 7c4be 480->487 488 7c41c-7c455 call 78100 call 829d0 480->488 482->483 490 7c2b4-7c2b8 482->490 485 7c380-7c388 call 75518 483->485 486 7c389-7c38c 483->486 485->486 492 7c397-7c399 486->492 493 7c38e-7c396 call 75518 486->493 495 7c4c1-7c4c4 487->495 518 7c457-7c464 call 79a9c 488->518 519 7c47a-7c495 LCMapStringA 488->519 497 7c2e7-7c328 call 78100 490->497 498 7c2ba-7c2bd 490->498 492->461 493->492 495->473 503 7c4c6-7c4cd call 75518 495->503 496->478 513 7c342-7c358 LCMapStringW 497->513 514 7c32a-7c339 call 79a9c 497->514 498->483 504 7c2c3-7c2c6 498->504 503->473 504->483 505 7c2cc-7c2e2 LCMapStringW 504->505 505->483 513->483 516 7c35a-7c35f 513->516 514->483 529 7c33b 514->529 520 7c365-7c368 516->520 521 7c361-7c363 516->521 522 7c497-7c499 518->522 530 7c466-7c473 call 829d0 518->530 519->522 523 7c49b-7c4bc call 784b0 519->523 527 7c36b-7c379 WideCharToMultiByte 520->527 521->527 522->495 523->495 527->483 529->513 530->519
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,000E6304,00000001,00000000,00000000,000E62E0,00000038,00083519,?,00000200,?,000000FF,00000000,00000000,?), ref: 0007C16D
        • GetLastError.KERNEL32 ref: 0007C17F
        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,000E62E0,00000038,00083519,?,00000200,?,000000FF,00000000,00000000,?), ref: 0007C206
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0007C287
        • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 0007C2A1
        • LCMapStringW.KERNEL32(?,?,?,00000000,?,?), ref: 0007C2DC
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: String$ByteCharMultiWide$ErrorLast
        • String ID:
        • API String ID: 1775797328-0
        • Opcode ID: 8603bc0e30da4305954f2cea76467bbe1c2de02f516117f8596a9c692dcf7c89
        • Instruction ID: b44d512eccecb0530d72566499c7bcef852470267376e0f454b8d88644f3fc05
        • Opcode Fuzzy Hash: 8603bc0e30da4305954f2cea76467bbe1c2de02f516117f8596a9c692dcf7c89
        • Instruction Fuzzy Hash: E2B15AB2C00259EFEF219FA4DC84CEE7BB5FB09324F10C129F919A2161D7398A51DB94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 606 719c2-719e1 call 804c0 609 71a15-71a18 606->609 610 719e3-719f6 CompareStringW 606->610 613 71a1a-71a26 call 719a6 609->613 614 71a29-71a2e 609->614 611 71a00-71a09 GetLastError 610->611 612 719f8-719fe 610->612 611->609 617 71a0b 611->617 612->609 613->614 615 71a30-71a3a call 719a6 614->615 616 71a3d-71a48 614->616 615->616 620 71c87-71c8d 616->620 621 71a4e-71a50 616->621 617->609 623 71c97-71c9c 620->623 624 71c8f-71c94 620->624 621->620 626 71a56-71a58 621->626 627 71ca4-71cb2 call 7846d 623->627 628 71c9e 623->628 624->623 629 71cb4-71cb6 626->629 630 71a5e-71a6a 626->630 627->629 639 71cb8-71cba 627->639 628->627 632 71d35-71d38 629->632 633 71a75-71a78 630->633 634 71a6c-71a72 630->634 636 71d3b call 77d0c 632->636 637 71a82-71a85 633->637 638 71a7a-71a7c 633->638 634->633 640 71d40-71d45 call 804fb 636->640 642 71a87-71a89 637->642 643 71a8e-71a90 637->643 638->637 641 71b2b-71b45 MultiByteToWideChar 638->641 645 71d05-71d21 CompareStringA 639->645 646 71cbc-71cd5 call 784b0 639->646 641->629 644 71b4b-71b8b call 78100 641->644 642->632 648 71a96-71a99 643->648 649 71d33 643->649 666 71ba5-71bb9 MultiByteToWideChar 644->666 667 71b8d-71b9c call 79a9c 644->667 645->649 651 71d23-71d32 call 75518 * 2 645->651 646->629 664 71cd7-71cf1 call 784b0 646->664 654 71aa3-71ab2 GetCPInfo 648->654 655 71a9b-71a9e 648->655 649->632 651->649 654->629 656 71ab8-71abb 654->656 655->632 660 71abd-71ac0 656->660 661 71ae8-71aeb 656->661 660->655 665 71ac2-71ac9 660->665 661->641 669 71aed-71af0 661->669 684 71cf3-71cfa call 75518 664->684 685 71cfc-71d02 664->685 665->655 671 71acb-71ad0 665->671 674 71c70-71c74 666->674 675 71bbf-71bdb MultiByteToWideChar 666->675 667->629 688 71ba2 667->688 669->649 676 71af6-71afd 669->676 671->655 678 71ad2-71ad9 671->678 680 71c76-71c7e call 75518 674->680 681 71c7f-71c82 674->681 675->674 682 71be1-71c1e call 78100 675->682 676->649 683 71b03-71b08 676->683 686 71adf-71ae4 678->686 687 71adb-71add 678->687 680->681 681->632 701 71c37-71c4c MultiByteToWideChar 682->701 702 71c20-71c2e call 79a9c 682->702 683->649 691 71b0e-71b15 683->691 684->629 685->645 686->671 694 71ae6 686->694 687->642 687->686 688->666 697 71b17-71b19 691->697 698 71b1f-71b24 691->698 694->655 697->642 697->698 698->683 699 71b26 698->699 699->649 704 71c63-71c67 701->704 705 71c4e-71c60 CompareStringW 701->705 702->674 708 71c30 702->708 704->674 707 71c69-71c6f call 75518 704->707 705->704 707->674 708->701
        APIs
        • CompareStringW.KERNEL32(00000000,00000000,000E6304,00000001,000E6304,00000001,000E62B8,00000040,00071E95,?,00000001,?,00000000,?,00000000,?), ref: 000719EE
        • GetLastError.KERNEL32 ref: 00071A00
        • GetCPInfo.KERNEL32(?,?,000E62B8,00000040,00071E95,?,00000001,?,00000000,?,00000000,?), ref: 00071AAA
        • MultiByteToWideChar.KERNEL32(?,00000009,00000000,?,00000000,00000000), ref: 00071B38
        • MultiByteToWideChar.KERNEL32(?,00000001,00000000,?,?,00000000), ref: 00071BB1
        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00071BCE
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 00071C44
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: ByteCharMultiWide$CompareErrorInfoLastString
        • String ID:
        • API String ID: 1773772771-0
        • Opcode ID: 0680862f06ad5474ccec719b2306111544f0f38fa7a60acad3dd86607165e537
        • Instruction ID: 4fab2d320805a582a17dd44c2d8c8e477f3a6161257fcf21ea6f0b946e671e3c
        • Opcode Fuzzy Hash: 0680862f06ad5474ccec719b2306111544f0f38fa7a60acad3dd86607165e537
        • Instruction Fuzzy Hash: 97B1BD71D01249AFDF22CFA8DC85AEE7BF5AF44350F208019F818A61E1D7398950CB9A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1092 801c2-801dc 1093 8020b-8020e 1092->1093 1094 801de-801e4 GetEnvironmentStringsW 1092->1094 1095 8028d-8028f 1093->1095 1096 80210-80212 1093->1096 1097 801f2-801fb GetLastError 1094->1097 1098 801e6-801f0 1094->1098 1101 80299-802a3 GetEnvironmentStrings 1095->1101 1102 80291-80293 1095->1102 1103 8021c-80221 1096->1103 1104 80214-8021a GetEnvironmentStringsW 1096->1104 1099 801fd-80204 1097->1099 1100 80206 1097->1100 1098->1096 1099->1093 1100->1093 1105 80295-80297 1101->1105 1106 802a5-802a7 1101->1106 1102->1101 1102->1105 1107 80231-8024e WideCharToMultiByte 1103->1107 1108 80223-80228 1103->1108 1104->1103 1104->1105 1109 802dd-802e3 1105->1109 1110 802a9-802ac 1106->1110 1111 802b3-802c3 call 79a9c 1106->1111 1113 80250-8025d call 79a9c 1107->1113 1114 80282-8028b FreeEnvironmentStringsW 1107->1114 1108->1108 1112 8022a-8022f 1108->1112 1110->1110 1115 802ae-802b1 1110->1115 1120 802c9-802d1 call 7e320 1111->1120 1121 802c5-802c7 1111->1121 1112->1107 1112->1108 1113->1114 1122 8025f-8026e WideCharToMultiByte 1113->1122 1114->1109 1115->1110 1115->1111 1123 802d4-802db FreeEnvironmentStringsA 1120->1123 1121->1123 1124 8027e 1122->1124 1125 80270-8027a call 75518 1122->1125 1123->1109 1124->1114 1125->1124
        APIs
        • GetEnvironmentStringsW.KERNEL32(76230A60,00000000,?,?,?,?,000816AB,?,000E6F30,00000060), ref: 000801DE
        • GetLastError.KERNEL32(?,?,?,?,000816AB,?,000E6F30,00000060), ref: 000801F2
        • GetEnvironmentStringsW.KERNEL32(76230A60,00000000,?,?,?,?,000816AB,?,000E6F30,00000060), ref: 00080214
        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,76230A60,00000000,?,?,?,?,000816AB), ref: 00080248
        • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,?,?,000816AB,?,000E6F30,00000060), ref: 0008026A
        • FreeEnvironmentStringsW.KERNEL32(00000000,?,?,?,?,000816AB,?,000E6F30,00000060), ref: 00080283
        • GetEnvironmentStrings.KERNEL32(76230A60,00000000,?,?,?,?,000816AB,?,000E6F30,00000060), ref: 00080299
        • FreeEnvironmentStringsA.KERNEL32(00000000), ref: 000802D5
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: EnvironmentStrings$ByteCharFreeMultiWide$ErrorLast
        • String ID:
        • API String ID: 883850110-0
        • Opcode ID: 99bd50f0d75e14a4fea7dea42c201e706e054c2da21295a1bdc41d897c7b8844
        • Instruction ID: 517ed5a843f8f0b8946537d70f9a9e246a0324104aad4bc08032a9bc83d06e4a
        • Opcode Fuzzy Hash: 99bd50f0d75e14a4fea7dea42c201e706e054c2da21295a1bdc41d897c7b8844
        • Instruction Fuzzy Hash: C231E5B25092196FEBF07F78AC8C83ABBDCFB453547250A29F5C5C3111E6A49C488BA1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1212 784b0-784dd call 804c0 1215 78656 1212->1215 1216 784e3-784f2 GetCPInfo 1212->1216 1217 78659-7865c 1215->1217 1218 78514-78517 1216->1218 1219 784f4-784f8 1216->1219 1222 78665 1217->1222 1223 7865e-78664 call 75518 1217->1223 1220 78533 1218->1220 1221 78519-7851c 1218->1221 1219->1218 1224 784fa-78505 GetCPInfo 1219->1224 1229 78536-78539 1220->1229 1226 78522-7852d call 80100 1221->1226 1227 7851e-78520 1221->1227 1230 78668-7866b 1222->1230 1223->1222 1224->1218 1225 78507-7850b 1224->1225 1225->1218 1231 7850d 1225->1231 1232 7852e-78531 1226->1232 1227->1232 1235 78555-7859b call 78100 call 829d0 1229->1235 1236 7853b-78553 MultiByteToWideChar 1229->1236 1237 7866e call 77d0c 1230->1237 1231->1218 1232->1229 1248 7859d-7859e 1235->1248 1249 785bb-785d0 MultiByteToWideChar 1235->1249 1236->1235 1239 785ad-785af 1236->1239 1241 78673-78678 call 804fb 1237->1241 1239->1230 1250 785a0 call 793d2 1248->1250 1249->1217 1251 785d6-785d9 1249->1251 1252 785a5-785ab 1250->1252 1253 785fb-785fe 1251->1253 1254 785db-785f1 WideCharToMultiByte 1251->1254 1252->1239 1255 785b4 1252->1255 1257 78616-78617 1253->1257 1258 78600-78614 WideCharToMultiByte 1253->1258 1254->1217 1256 785f3-785f9 1254->1256 1255->1249 1256->1217 1259 78619 call 793d2 1257->1259 1258->1217 1258->1257 1260 7861e-78625 1259->1260 1260->1217 1261 78627-78639 WideCharToMultiByte 1260->1261 1262 7863b-78647 call 75518 1261->1262 1263 78649-7864d 1261->1263 1262->1217 1263->1217 1265 7864f-78654 1263->1265 1265->1217
        APIs
        • GetCPInfo.KERNEL32(?,?,000E6A98,00000038,0007EC9B,?,00000000,?,?,00000000,00000000,000E6308,0000001C,000855B6,00000001,?), ref: 000784EE
        • GetCPInfo.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,000784A5,?), ref: 00078501
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000,?,?,?,?,?,?,?,00000000,?,000784A5), ref: 00078546
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: Info$ByteCharMultiWide
        • String ID:
        • API String ID: 1166650589-0
        • Opcode ID: 0a6b25738dc5eb4b4fc07bd5ad752d3a7a3074f3a279183a3631d338b000e46c
        • Instruction ID: 448b6ec37a9e7244a7e66ab4c37fd1704f25a9d7bbec3f8ebb2c3ec2618641c4
        • Opcode Fuzzy Hash: 0a6b25738dc5eb4b4fc07bd5ad752d3a7a3074f3a279183a3631d338b000e46c
        • Instruction Fuzzy Hash: 67516871D40608BBCF619F95EC88DAEBBB9FF84760F24C51AF418A2190EB748950CB64

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1267 7159b-715a8 1269 715c0-715c4 ExitProcess 1267->1269 1270 715aa-715b8 GetProcAddress 1267->1270 1270->1269 1271 715ba 1270->1271 1271->1269
        APIs
        • GetModuleHandleA.KERNEL32(mscoree.dll,00071709,?,000E6B08,00000008,00071740,?,00000001,00000000,000834A4,00000003), ref: 000715A0
        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 000715B0
        • ExitProcess.KERNEL32 ref: 000715C4
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: AddressExitHandleModuleProcProcess
        • String ID: CorExitProcess$`#v$mscoree.dll
        • API String ID: 75539706-966225676
        • Opcode ID: 06a6733590d9ca14e7de26208a70d5675b718ff03c8a336ce09fe08186e7978f
        • Instruction ID: 2e771a567c905a057f2fe5951358b42583f698ff588ac9738087ec0d3765034e
        • Opcode Fuzzy Hash: 06a6733590d9ca14e7de26208a70d5675b718ff03c8a336ce09fe08186e7978f
        • Instruction Fuzzy Hash: 4BD0C730648702FFE7002F669C4DE1B3AD8BF50B817148424B45AE10A4DF7AD950DB2A

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1272 80667-8067e call 804c0 1275 80680-80693 GetStringTypeW 1272->1275 1276 806b2-806b9 1272->1276 1277 8069d-806a6 GetLastError 1275->1277 1278 80695-8069b 1275->1278 1279 806bb-806cd GetStringTypeW 1276->1279 1280 806d2-806d5 1276->1280 1277->1276 1281 806a8 1277->1281 1278->1276 1282 80883-8088b call 804fb 1279->1282 1283 806db-806e4 1280->1283 1284 806d7-806d9 1280->1284 1281->1276 1287 806ee-806f1 1283->1287 1288 806e6-806eb 1283->1288 1284->1283 1285 8072e-80730 1284->1285 1285->1282 1290 806fb-80707 call 7846d 1287->1290 1291 806f3-806f8 1287->1291 1288->1287 1294 80709-8070c 1290->1294 1295 80711-8072c WideCharToMultiByte 1290->1295 1291->1290 1294->1295 1296 8070e 1294->1296 1295->1285 1297 80735-8077d call 78100 call 829d0 1295->1297 1296->1295 1303 8077f-80780 1297->1303 1304 80792-807aa WideCharToMultiByte 1297->1304 1307 80781 call 793d2 1303->1307 1305 807b0-807ef call 78100 1304->1305 1306 80872-80875 1304->1306 1317 807f1-80801 call 79a9c 1305->1317 1318 80806-80809 1305->1318 1309 80880 1306->1309 1310 80877-8087f call 75518 1306->1310 1311 80786-8078d 1307->1311 1309->1282 1310->1309 1311->1285 1314 8078f 1311->1314 1314->1304 1317->1306 1326 80803 1317->1326 1320 8080b-80810 1318->1320 1321 80813-80843 GetStringTypeA 1318->1321 1320->1321 1323 8085d 1321->1323 1324 80845-8084a 1321->1324 1325 80861-80865 1323->1325 1324->1323 1327 8084c-8085b call 83020 1324->1327 1328 80870 1325->1328 1329 80867-8086f call 75518 1325->1329 1326->1318 1327->1325 1328->1306 1329->1328
        APIs
        • GetStringTypeW.KERNEL32(00000001,000E6304,00000001,?,000E6AB8,00000024), ref: 0008068B
        • GetLastError.KERNEL32 ref: 0008069D
        • GetStringTypeW.KERNEL32(?,?,?,?,000E6AB8,00000024), ref: 000806C7
        • WideCharToMultiByte.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,000E6AB8,00000024), ref: 0008071F
        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000000,?,00000000,00000000,00000000), ref: 000807A2
        • GetStringTypeA.KERNEL32(?,?,?,00000000,?), ref: 00080834
          • Part of subcall function 000793D2: __lock.LIBCMT ref: 00079416
          • Part of subcall function 000793D2: HeapAlloc.KERNEL32(00000008,?,000E5FA8,00000010,000711FE,00000001,0000008C,?,0007553B,00000004,000E5FB8,0000000C,0007E79A,00000000,?,00071478), ref: 00079454
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: StringType$ByteCharMultiWide$AllocErrorHeapLast__lock
        • String ID:
        • API String ID: 892864237-0
        • Opcode ID: c1cd5ede65a09846e62903b26f85f7f8408358f6ae352db53c0ee6afef16ea58
        • Instruction ID: 2032d777c852418add6debd72989f29bbd8b9c9baa9d40fb2c865536fe4bb1a0
        • Opcode Fuzzy Hash: c1cd5ede65a09846e62903b26f85f7f8408358f6ae352db53c0ee6afef16ea58
        • Instruction Fuzzy Hash: 16518F71C00219EFDFA1AFA4DC499EE7BB4FF09760B208119F894A2161D7348AA5DFD0
        APIs
        • GetStringTypeW.KERNEL32(00000001,000E6304,00000001,?,000E6308,0000001C,000855B6,00000001,?,00000001,?,?,?,00000001,?,?), ref: 0007EB3C
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,00000000,?,000784A5,?), ref: 0007EB4E
        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,000E6308,0000001C,000855B6,00000001,?,00000001,?,?,?,00000001), ref: 0007EBB0
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0007EC2E
        • GetStringTypeW.KERNEL32(?,?,00000000,?), ref: 0007EC40
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: ByteCharMultiStringTypeWide$ErrorLast
        • String ID:
        • API String ID: 3581945363-0
        • Opcode ID: 01848215c3a20cc4c2cc5515498e83bfd4cc9d2d1523d4b00058399fd2ca35e4
        • Instruction ID: 80f7cb2f6730666f4dd8036b3b656916c0f6fcfc269398787934c73b47670dff
        • Opcode Fuzzy Hash: 01848215c3a20cc4c2cc5515498e83bfd4cc9d2d1523d4b00058399fd2ca35e4
        • Instruction Fuzzy Hash: 1941C175C01655EBDF228F64DC49AEE3FA5FF08B60F248144F908A61A1C739C951DBA8
        APIs
        • VirtualQuery.KERNEL32(?,?,0000001C,?,?,?,?,?,000837B5,?), ref: 00077AFA
        • InterlockedExchange.KERNEL32(000FE2F4,00000001), ref: 00077B78
        • InterlockedExchange.KERNEL32(000FE2F4,00000000), ref: 00077BDD
        • InterlockedExchange.KERNEL32(000FE2F4,00000001), ref: 00077C01
        • InterlockedExchange.KERNEL32(000FE2F4,00000000), ref: 00077C61
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: ExchangeInterlocked$QueryVirtual
        • String ID:
        • API String ID: 2947987494-0
        • Opcode ID: 2f59f4c627ad6f74709f7efb077c3d8c34e41711166af645bdaa2cf3bddd6a50
        • Instruction ID: a71bf7a562c56f3a235464864ff39cbe8645095d194f2608e6e35437ebe6332b
        • Opcode Fuzzy Hash: 2f59f4c627ad6f74709f7efb077c3d8c34e41711166af645bdaa2cf3bddd6a50
        • Instruction Fuzzy Hash: 4151F430F086459FEBA68F28C8C477C73E5AB89790F24C129D85D872A1E378DD81C74A
        APIs
        • GetStartupInfoA.KERNEL32(?), ref: 0007F370
        • GetFileType.KERNEL32(?), ref: 0007F41A
        • GetStdHandle.KERNEL32(-000000F6), ref: 0007F49B
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileHandleInfoStartupType
        • String ID:
        • API String ID: 2461013171-0
        • Opcode ID: 5e497053f563c57ff14c9d2d7af8582d78700e1b81314d738683e7db058cc79f
        • Instruction ID: b04c22d3e43f50b89564a9630b21cef8b508d341d1b7098d934377a242849feb
        • Opcode Fuzzy Hash: 5e497053f563c57ff14c9d2d7af8582d78700e1b81314d738683e7db058cc79f
        • Instruction Fuzzy Hash: 6E519F719087438FD764CB28C884A7677E4BB05324F28CA39E5AEC71E2DB78D449DB19
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: cda5b39ad5a41ca12c7350cb144cdcb40ed0bf20cd431a1f4231d0bb4d27c884
        • Instruction ID: 8f1758ac30ae5ceaad50b3984df04cd7d459d4607001cb68ae7962231c3f712c
        • Opcode Fuzzy Hash: cda5b39ad5a41ca12c7350cb144cdcb40ed0bf20cd431a1f4231d0bb4d27c884
        • Instruction Fuzzy Hash: 5B416771D06162ABDF607F64CC888AF7AA4FB403A0710C639F91DA6192E73C4D41CBDA
        APIs
        • LCMapStringW.KERNEL32(00000000,00000100,000E6304,00000001,00000000,00000000,000E62E0,00000038,00083519,?,00000200,?,000000FF,00000000,00000000,?), ref: 0007C16D
        • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,000E62E0,00000038,00083519,?,00000200,?,000000FF,00000000,00000000,?), ref: 0007C206
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 0007C287
        • LCMapStringW.KERNEL32(?,?,?,00000000,00000000,00000000), ref: 0007C2A1
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: ByteCharMultiStringWide
        • String ID:
        • API String ID: 2829165498-0
        • Opcode ID: 279061e1eaa192b514e1f9d143510237e77893c6c808ebddcc9267417c177dfc
        • Instruction ID: 8cb14dd4cab344e7cb36ea6ba9b7823b08d8bc6eb8fd97f9649216f1b0a1692f
        • Opcode Fuzzy Hash: 279061e1eaa192b514e1f9d143510237e77893c6c808ebddcc9267417c177dfc
        • Instruction Fuzzy Hash: 484168B1C00249EFEF218FA4DC849EE7FB5FB09314F10C129F919A21A1C7798A51DB94
        APIs
          • Part of subcall function 00083EB0: GetCurrentThreadId.KERNEL32 ref: 00083ECA
        • GetCurrentProcessId.KERNEL32 ref: 00082F82
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: Current$ProcessThread
        • String ID: %x ) %d ) %08x$1ce0383e$1ce0383e ) -600116419 ) 30fc6189
        • API String ID: 2063062207-3315764354
        • Opcode ID: 42e0cad06661989af4018a1bfe30eafe5c597bb6fc32b63a72eac73c87c8e486
        • Instruction ID: 7cf9ded32cd1a9377fe2cac0b0aa3a2e8d767f8cc673d16a9e840997aa49f8b8
        • Opcode Fuzzy Hash: 42e0cad06661989af4018a1bfe30eafe5c597bb6fc32b63a72eac73c87c8e486
        • Instruction Fuzzy Hash: 0A0182B1C043446FE711BBA4DD0AA6E3A70EB10700F140434F94526663F7BA5529D797
        APIs
        • GetModuleHandleA.KERNEL32(?,00079BB0), ref: 000797C9
        • LoadLibraryA.KERNEL32(?), ref: 000797DB
        • LoadLibraryA.KERNEL32 ref: 000797FC
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: LibraryLoad$HandleModule
        • String ID: `#v
        • API String ID: 2593893887-272240289
        • Opcode ID: 900c21839467a17b24c72a6253bf84a6febb72ccd99c368752dcfb63c4043e21
        • Instruction ID: 5eae93d5017cc9d2cc5799f91aa78d5c014378b1d87df17126cc82a6c633d41a
        • Opcode Fuzzy Hash: 900c21839467a17b24c72a6253bf84a6febb72ccd99c368752dcfb63c4043e21
        • Instruction Fuzzy Hash: 8CE0C935905381EFEB51AF70EC489697FB1FB44301F108925E44992A35DB3D9060EB02
        APIs
        • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 0007DE46
        • GetLastError.KERNEL32 ref: 0007DE50
        • ReadFile.KERNEL32(?,?,00000001,?,00000000), ref: 0007DF19
        • GetLastError.KERNEL32 ref: 0007DF23
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: ErrorFileLastRead
        • String ID:
        • API String ID: 1948546556-0
        • Opcode ID: 6a6a2fb55ba79ac9f95cae2bf3e7b8478b69c41f983fbfea8b39e0b56cefc34d
        • Instruction ID: 7288ec63e648d031b3ff35f39ac93c252d92b6168c36e1d9cc01dda9b0d3c120
        • Opcode Fuzzy Hash: 6a6a2fb55ba79ac9f95cae2bf3e7b8478b69c41f983fbfea8b39e0b56cefc34d
        • Instruction Fuzzy Hash: CB61C670E043859FDB21CF58C884BAD7BF0AF12314F54C0ABE86A9B296C778D951CB59
        APIs
        • WriteFile.KERNEL32(?,?,?,?,00000000,?,0010CDF0,00000001), ref: 00080A61
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileWrite
        • String ID:
        • API String ID: 3934441357-0
        • Opcode ID: bcbe1d5fcf13e541f2079d18d8934fd03805ee11229da594ed68ec7de2e9f6f0
        • Instruction ID: 65b6463833d531aac3e6a29a7d1ef7205d7f9c2aaff0dafc39a66db6fde63401
        • Opcode Fuzzy Hash: bcbe1d5fcf13e541f2079d18d8934fd03805ee11229da594ed68ec7de2e9f6f0
        • Instruction Fuzzy Hash: 8A514A31A04248CFDB76EFA9CC85AEDBBF8BF45304F244119E8999B256D7709A05CF12
        APIs
          • Part of subcall function 00071762: VirtualQuery.KERNEL32(?,?,0000001C), ref: 0007177C
          • Part of subcall function 00071762: GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0007178D
          • Part of subcall function 00071762: VirtualQuery.KERNEL32(?,?,0000001C,?,?,0000001C), ref: 000717D3
        • MultiByteToWideChar.KERNEL32(?,00000001,00000000,?,?,00000000), ref: 00071BB1
        • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00071BCE
        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 00071C44
        • CompareStringW.KERNEL32(?,?,?,00000000,?,00000000,?,00000000), ref: 00071C5A
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: ByteCharMultiWide$QueryVirtual$CompareInfoStringSystem
        • String ID:
        • API String ID: 1997773198-0
        • Opcode ID: bbbdf4217883f493cddcf87dc7557e15c91346feef404cef4b0e7b85976355d9
        • Instruction ID: d6b80e24fb170c6fc479f6d2c6ccdd3e7a81895bb66f339d4fcb051cfa5dc982
        • Opcode Fuzzy Hash: bbbdf4217883f493cddcf87dc7557e15c91346feef404cef4b0e7b85976355d9
        • Instruction Fuzzy Hash: 2A315731C41608ABDF229FA8DD49BDEBFB6BF44750F208104F828A61E1CB789951DB94
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: Info
        • String ID: $
        • API String ID: 1807457897-3032137957
        • Opcode ID: 312a6cc7d374cb0af64f80c8b83cb5c083d62539e7bcd4432ee83953350b2ef1
        • Instruction ID: 74be24d51cb822bd444cb36515ca18854361710f1b1bbbdef310d16b6df34bcf
        • Opcode Fuzzy Hash: 312a6cc7d374cb0af64f80c8b83cb5c083d62539e7bcd4432ee83953350b2ef1
        • Instruction Fuzzy Hash: 3F41487090028E7EEB258758DC59FFA7FE8AB05704F28C4F0D64DCB153C1684A85DB9A
        APIs
        • ___initmbctable.LIBCMT ref: 0007A0BC
        • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\Internet Explorer\iexplore.exe,00000104,76230A60,00000000,?,?,?,?,000816B5,?,000E6F30,00000060), ref: 0007A0D4
        Strings
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe, xrefs: 0007A0C6, 0007A0CB
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: FileModuleName___initmbctable
        • String ID: C:\Program Files (x86)\Internet Explorer\iexplore.exe
        • API String ID: 767393020-908218840
        • Opcode ID: 53ca78f9c7cf0eceb9151c977e06f58b4aa88aea31a3c1b8ba8d8cab091a9c60
        • Instruction ID: ec197f2e778c7317529da3e20e555ca5af74fcf3394cc1999d6a3d8adb97d826
        • Opcode Fuzzy Hash: 53ca78f9c7cf0eceb9151c977e06f58b4aa88aea31a3c1b8ba8d8cab091a9c60
        • Instruction Fuzzy Hash: E0112C72F04244AFE720CBA8EC459AE77F8EB85360F10017AF909D3251D67C9E44CBA5
        APIs
        • HeapReAlloc.KERNEL32(00000000,00000050,00000000,00076A9D,00000000,?,00000000), ref: 000764D3
        • HeapAlloc.KERNEL32(00000008,000041C4,00000000,00000000,00076A9D,00000000,?,00000000), ref: 0007650C
        • VirtualAlloc.KERNEL32(00000000,00100000,00002000,00000004), ref: 0007652A
        • HeapFree.KERNEL32(00000000,?), ref: 00076541
        Memory Dump Source
        • Source File: 00000004.00000002.2370134059.0000000000071000.00000020.00000001.01000000.00000003.sdmp, Offset: 00070000, based on PE: true
        • Associated: 00000004.00000002.2370114466.0000000000070000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370158930.0000000000087000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370213044.00000000000FC000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370229436.00000000000FE000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370243603.00000000000FF000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370260977.000000000010C000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370275222.000000000010D000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370291300.0000000000110000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370307513.0000000000111000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000004.00000002.2370328321.000000000011A000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_4_2_70000_SecuriteInfo.jbxd
        Similarity
        • API ID: AllocHeap$FreeVirtual
        • String ID:
        • API String ID: 3499195154-0
        • Opcode ID: 5b9ebf3769984cb59699bba59586b692b8bfde7e4a832e423f2b5c2ef929b994
        • Instruction ID: 8055a99bc8b9843e078cb0bacb68f4ce1da5047fd2200952caca5e975e3ce210
        • Opcode Fuzzy Hash: 5b9ebf3769984cb59699bba59586b692b8bfde7e4a832e423f2b5c2ef929b994
        • Instruction Fuzzy Hash: 03119D30204A05EFD7308F29EC45D26BBF1FB81354B208A29F1A6C39B4D3B5A886DF44