Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
loader.exe

Overview

General Information

Sample name:loader.exe
Analysis ID:1525820
MD5:b750903ba5abb6ee7528aad139ec6404
SHA1:9a6107f86b044d6783a202c3f16310d2ca60f149
SHA256:11f98be1f2418783aec952a9814bbe8c26010554c2662671ab4b18f7e425b4b6
Tags:exeuser-aachum
Infos:

Detection

RedLine
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
.NET source code contains very large array initializations
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Enables security privileges
Found evasive API chain (may stop execution after checking a module file name)
Found potential string decryption / allocating functions
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • loader.exe (PID: 4928 cmdline: "C:\Users\user\Desktop\loader.exe" MD5: B750903BA5ABB6EE7528AAD139EC6404)
    • conhost.exe (PID: 824 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
No configs have been found
SourceRuleDescriptionAuthorStrings
loader.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0x700:$s3: 83 EC 38 53 B0 0B 88 44 24 2B 88 44 24 2F B0 86 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1e9d0:$s5: delete[]
  • 0x1de88:$s6: constructor or from DllMain.
SourceRuleDescriptionAuthorStrings
Process Memory Space: loader.exe PID: 4928JoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    0.2.loader.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 0B 88 44 24 2B 88 44 24 2F B0 86 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    0.0.loader.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 0B 88 44 24 2B 88 44 24 2F B0 86 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: loader.exeAvira: detected
    Source: loader.exeReversingLabs: Detection: 68%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: loader.exeJoe Sandbox ML: detected
    Source: loader.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: Binary string: _.pdb source: loader.exe, 00000000.00000003.1486292327.000000000081B000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000002.1506599549.0000000002370000.00000004.08000000.00040000.00000000.sdmp, loader.exe, 00000000.00000002.1506666108.00000000023E6000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000002.1509937450.0000000003991000.00000004.00000800.00020000.00000000.sdmp
    Source: loader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: loader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
    Source: loader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb`, equals www.youtube.com (Youtube)
    Source: loader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
    Source: loader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
    Source: loader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
    Source: loader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
    Source: loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
    Source: loader.exe, 00000000.00000002.1507826756.0000000002C05000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_b8ae76c6-a

    System Summary

    barindex
    Source: loader.exe, type: SAMPLEMatched rule: Detects RedLine infostealer Author: ditekSHen
    Source: 0.2.loader.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
    Source: 0.0.loader.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
    Source: 0.3.loader.exe.81b900.0.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csLarge array initialization: R3D7rEdzqGVdFfcfcJ6: array initializer size 6160
    Source: 0.2.loader.exe.2730000.5.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csLarge array initialization: R3D7rEdzqGVdFfcfcJ6: array initializer size 6160
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csLarge array initialization: R3D7rEdzqGVdFfcfcJ6: array initializer size 6160
    Source: 0.2.loader.exe.3996458.6.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csLarge array initialization: R3D7rEdzqGVdFfcfcJ6: array initializer size 6160
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csLarge array initialization: R3D7rEdzqGVdFfcfcJ6: array initializer size 6160
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csLarge array initialization: R3D7rEdzqGVdFfcfcJ6: array initializer size 6160
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00408C600_2_00408C60
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0040DC110_2_0040DC11
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00407C3F0_2_00407C3F
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00418CCC0_2_00418CCC
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00406CA00_2_00406CA0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004028B00_2_004028B0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0041A4BE0_2_0041A4BE
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004182440_2_00418244
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004016500_2_00401650
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00402F200_2_00402F20
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004193C40_2_004193C4
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004187880_2_00418788
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00402F890_2_00402F89
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00402B900_2_00402B90
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004073A00_2_004073A0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_022EE17C0_2_022EE17C
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_027B01D80_2_027B01D8
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_027B01C80_2_027B01C8
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0291D3B00_2_0291D3B0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0291CE880_2_0291CE88
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_069E04D00_2_069E04D0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_069E6C230_2_069E6C23
    Source: C:\Users\user\Desktop\loader.exeProcess token adjusted: SecurityJump to behavior
    Source: C:\Users\user\Desktop\loader.exeCode function: String function: 0040E1D8 appears 43 times
    Source: loader.exe, 00000000.00000003.1486292327.000000000081B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exe, 00000000.00000003.1486292327.000000000081B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs loader.exe
    Source: loader.exe, 00000000.00000002.1506599549.0000000002370000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exe, 00000000.00000002.1506599549.0000000002370000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs loader.exe
    Source: loader.exe, 00000000.00000003.1486292327.00000000008AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exe, 00000000.00000002.1506666108.00000000023E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exe, 00000000.00000002.1506666108.00000000023E6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs loader.exe
    Source: loader.exe, 00000000.00000003.1485913497.000000000089C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs loader.exe
    Source: loader.exe, 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exe, 00000000.00000002.1507423486.0000000002730000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exe, 00000000.00000003.1485860221.000000000088D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs loader.exe
    Source: loader.exe, 00000000.00000002.1509937450.0000000003991000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exe, 00000000.00000002.1509937450.0000000003991000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename_.dll4 vs loader.exe
    Source: loader.exeBinary or memory string: OriginalFilenameSunroom.exe" vs loader.exe
    Source: loader.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
    Source: loader.exe, type: SAMPLEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
    Source: 0.2.loader.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
    Source: 0.0.loader.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
    Source: loader.exeStatic PE information: Section: .rsrc ZLIB complexity 0.9936445223112128
    Source: 0.3.loader.exe.81b900.0.raw.unpack, rcfyuyTzwAVvRrBPRJL.csCryptographic APIs: 'TransformFinalBlock'
    Source: 0.3.loader.exe.81b900.0.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csCryptographic APIs: 'CreateDecryptor'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, rcfyuyTzwAVvRrBPRJL.csCryptographic APIs: 'TransformFinalBlock'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csCryptographic APIs: 'CreateDecryptor'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, rcfyuyTzwAVvRrBPRJL.csCryptographic APIs: 'TransformFinalBlock'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csCryptographic APIs: 'CreateDecryptor'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, rcfyuyTzwAVvRrBPRJL.csCryptographic APIs: 'TransformFinalBlock'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csCryptographic APIs: 'CreateDecryptor'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, rcfyuyTzwAVvRrBPRJL.csCryptographic APIs: 'TransformFinalBlock'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csCryptographic APIs: 'CreateDecryptor'
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, rcfyuyTzwAVvRrBPRJL.csCryptographic APIs: 'TransformFinalBlock'
    Source: 0.3.loader.exe.81b900.0.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csBase64 encoded string: 'NQQ5Cy4TBwAnFDw2FjQBJSEwSjsYXUY4Iz4LGiIvJCshJz9nOysfTBk4HxkgATkJIT4OOyUkDTsNCUNE'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csBase64 encoded string: 'NQQ5Cy4TBwAnFDw2FjQBJSEwSjsYXUY4Iz4LGiIvJCshJz9nOysfTBk4HxkgATkJIT4OOyUkDTsNCUNE'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csBase64 encoded string: 'NQQ5Cy4TBwAnFDw2FjQBJSEwSjsYXUY4Iz4LGiIvJCshJz9nOysfTBk4HxkgATkJIT4OOyUkDTsNCUNE'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csBase64 encoded string: 'NQQ5Cy4TBwAnFDw2FjQBJSEwSjsYXUY4Iz4LGiIvJCshJz9nOysfTBk4HxkgATkJIT4OOyUkDTsNCUNE'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csBase64 encoded string: 'NQQ5Cy4TBwAnFDw2FjQBJSEwSjsYXUY4Iz4LGiIvJCshJz9nOysfTBk4HxkgATkJIT4OOyUkDTsNCUNE'
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, R3D7rEdzqGVdFfcfcJ6.csBase64 encoded string: 'NQQ5Cy4TBwAnFDw2FjQBJSEwSjsYXUY4Iz4LGiIvJCshJz9nOysfTBk4HxkgATkJIT4OOyUkDTsNCUNE'
    Source: classification engineClassification label: mal88.troj.evad.winEXE@2/1@0/0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
    Source: C:\Users\user\Desktop\loader.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\loader.exe.logJump to behavior
    Source: C:\Users\user\Desktop\loader.exeMutant created: NULL
    Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:824:120:WilError_03
    Source: C:\Users\user\Desktop\loader.exeCommand line argument: 08A0_2_00413780
    Source: loader.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\loader.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: loader.exeReversingLabs: Detection: 68%
    Source: unknownProcess created: C:\Users\user\Desktop\loader.exe "C:\Users\user\Desktop\loader.exe"
    Source: C:\Users\user\Desktop\loader.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Source: C:\Users\user\Desktop\loader.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: mscoree.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: amsi.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: msasn1.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: gpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptsp.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: rsaenh.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: dwrite.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: loader.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
    Source: Binary string: _.pdb source: loader.exe, 00000000.00000003.1486292327.000000000081B000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000002.1506599549.0000000002370000.00000004.08000000.00040000.00000000.sdmp, loader.exe, 00000000.00000002.1506666108.00000000023E6000.00000004.00000020.00020000.00000000.sdmp, loader.exe, 00000000.00000002.1509937450.0000000003991000.00000004.00000800.00020000.00000000.sdmp
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
    Source: loader.exeStatic PE information: real checksum: 0x23bfb should be: 0x5e6f5
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0040E21D push ecx; ret 0_2_0040E230
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_027B9A60 push esp; iretd 0_2_027B9A61
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_069E900D push FFFFFF8Bh; iretd 0_2_069E900F
    Source: 0.3.loader.exe.81b900.0.raw.unpack, pV6W58JtYEixu9F3IDb.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'G7Hn8sA5yr', 'mdCJcYCmWJ', 'lxKJgTVIr9', 'TmeJQCwAIf', 'wNsJvuMlem', 'JdjJ0yfWaK', 'HTWOMU5HZG', 'ChUn3VFYXt', 'Y1rn7CeXec'
    Source: 0.3.loader.exe.81b900.0.raw.unpack, sjGxSN2D3DSb9ZRckQw.csHigh entropy of concatenated method names: 'ShowMessage', 'Yfp26y1pZ3', 'U5q2ZcjaFm', 'Ae12PWjUH0', 'gpT2KgrniZ', 'sXL2M1QRIf', 'Vhq2j06REx', 'zIu2zqwkQv', 'qQR83p3aHE', 'wZ48Wmh9Kf'
    Source: 0.3.loader.exe.81b900.0.raw.unpack, uvKl4jd2pdrDKv5i801.csHigh entropy of concatenated method names: 'mGgd7gOw5e', 'ISwd55nMya', 'VnrdT5iOGo', 'ctGd1h4D41', 'LQtdxnO6bt', 'jGAdpMLYLa', 'vpndCOuAlZ', 'N3kdX97FHp', 'iJSdOgxSZL', 'J7jdnZEpUl'
    Source: 0.3.loader.exe.81b900.0.raw.unpack, qYt2UGWxomMCcArni6L.csHigh entropy of concatenated method names: 'ABHWU0Q5M7', 'subWt2bppy', 'G8pWckTVZR', 'D5GWge2ebs', 'CMTWCfyMjj', 'CfTWXYoR3u', 'V63WOENucu', 'y8RWng56rs', 'dUWWb7psyB', 'tJjWN5IVnM'
    Source: 0.3.loader.exe.81b900.0.raw.unpack, ImLCtHJpB7Y34H2qdnG.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'ChUn3VFYXt', 'HTWOMU5HZG', 'bRUnWXH8lY', 'olQnLg4V9M', 'ojUni3EWO6', 'F5gnJo62vD', 'YS1nql2bUi', 'YBiJXVq2wc', 'w39ndGQkM9'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, pV6W58JtYEixu9F3IDb.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'G7Hn8sA5yr', 'mdCJcYCmWJ', 'lxKJgTVIr9', 'TmeJQCwAIf', 'wNsJvuMlem', 'JdjJ0yfWaK', 'HTWOMU5HZG', 'ChUn3VFYXt', 'Y1rn7CeXec'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, sjGxSN2D3DSb9ZRckQw.csHigh entropy of concatenated method names: 'ShowMessage', 'Yfp26y1pZ3', 'U5q2ZcjaFm', 'Ae12PWjUH0', 'gpT2KgrniZ', 'sXL2M1QRIf', 'Vhq2j06REx', 'zIu2zqwkQv', 'qQR83p3aHE', 'wZ48Wmh9Kf'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, uvKl4jd2pdrDKv5i801.csHigh entropy of concatenated method names: 'mGgd7gOw5e', 'ISwd55nMya', 'VnrdT5iOGo', 'ctGd1h4D41', 'LQtdxnO6bt', 'jGAdpMLYLa', 'vpndCOuAlZ', 'N3kdX97FHp', 'iJSdOgxSZL', 'J7jdnZEpUl'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, qYt2UGWxomMCcArni6L.csHigh entropy of concatenated method names: 'ABHWU0Q5M7', 'subWt2bppy', 'G8pWckTVZR', 'D5GWge2ebs', 'CMTWCfyMjj', 'CfTWXYoR3u', 'V63WOENucu', 'y8RWng56rs', 'dUWWb7psyB', 'tJjWN5IVnM'
    Source: 0.2.loader.exe.2730000.5.raw.unpack, ImLCtHJpB7Y34H2qdnG.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'ChUn3VFYXt', 'HTWOMU5HZG', 'bRUnWXH8lY', 'olQnLg4V9M', 'ojUni3EWO6', 'F5gnJo62vD', 'YS1nql2bUi', 'YBiJXVq2wc', 'w39ndGQkM9'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, pV6W58JtYEixu9F3IDb.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'G7Hn8sA5yr', 'mdCJcYCmWJ', 'lxKJgTVIr9', 'TmeJQCwAIf', 'wNsJvuMlem', 'JdjJ0yfWaK', 'HTWOMU5HZG', 'ChUn3VFYXt', 'Y1rn7CeXec'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, sjGxSN2D3DSb9ZRckQw.csHigh entropy of concatenated method names: 'ShowMessage', 'Yfp26y1pZ3', 'U5q2ZcjaFm', 'Ae12PWjUH0', 'gpT2KgrniZ', 'sXL2M1QRIf', 'Vhq2j06REx', 'zIu2zqwkQv', 'qQR83p3aHE', 'wZ48Wmh9Kf'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, uvKl4jd2pdrDKv5i801.csHigh entropy of concatenated method names: 'mGgd7gOw5e', 'ISwd55nMya', 'VnrdT5iOGo', 'ctGd1h4D41', 'LQtdxnO6bt', 'jGAdpMLYLa', 'vpndCOuAlZ', 'N3kdX97FHp', 'iJSdOgxSZL', 'J7jdnZEpUl'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, qYt2UGWxomMCcArni6L.csHigh entropy of concatenated method names: 'ABHWU0Q5M7', 'subWt2bppy', 'G8pWckTVZR', 'D5GWge2ebs', 'CMTWCfyMjj', 'CfTWXYoR3u', 'V63WOENucu', 'y8RWng56rs', 'dUWWb7psyB', 'tJjWN5IVnM'
    Source: 0.2.loader.exe.2370ee8.2.raw.unpack, ImLCtHJpB7Y34H2qdnG.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'ChUn3VFYXt', 'HTWOMU5HZG', 'bRUnWXH8lY', 'olQnLg4V9M', 'ojUni3EWO6', 'F5gnJo62vD', 'YS1nql2bUi', 'YBiJXVq2wc', 'w39ndGQkM9'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, pV6W58JtYEixu9F3IDb.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'G7Hn8sA5yr', 'mdCJcYCmWJ', 'lxKJgTVIr9', 'TmeJQCwAIf', 'wNsJvuMlem', 'JdjJ0yfWaK', 'HTWOMU5HZG', 'ChUn3VFYXt', 'Y1rn7CeXec'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, sjGxSN2D3DSb9ZRckQw.csHigh entropy of concatenated method names: 'ShowMessage', 'Yfp26y1pZ3', 'U5q2ZcjaFm', 'Ae12PWjUH0', 'gpT2KgrniZ', 'sXL2M1QRIf', 'Vhq2j06REx', 'zIu2zqwkQv', 'qQR83p3aHE', 'wZ48Wmh9Kf'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, uvKl4jd2pdrDKv5i801.csHigh entropy of concatenated method names: 'mGgd7gOw5e', 'ISwd55nMya', 'VnrdT5iOGo', 'ctGd1h4D41', 'LQtdxnO6bt', 'jGAdpMLYLa', 'vpndCOuAlZ', 'N3kdX97FHp', 'iJSdOgxSZL', 'J7jdnZEpUl'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, qYt2UGWxomMCcArni6L.csHigh entropy of concatenated method names: 'ABHWU0Q5M7', 'subWt2bppy', 'G8pWckTVZR', 'D5GWge2ebs', 'CMTWCfyMjj', 'CfTWXYoR3u', 'V63WOENucu', 'y8RWng56rs', 'dUWWb7psyB', 'tJjWN5IVnM'
    Source: 0.2.loader.exe.3996458.6.raw.unpack, ImLCtHJpB7Y34H2qdnG.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'ChUn3VFYXt', 'HTWOMU5HZG', 'bRUnWXH8lY', 'olQnLg4V9M', 'ojUni3EWO6', 'F5gnJo62vD', 'YS1nql2bUi', 'YBiJXVq2wc', 'w39ndGQkM9'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, pV6W58JtYEixu9F3IDb.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'G7Hn8sA5yr', 'mdCJcYCmWJ', 'lxKJgTVIr9', 'TmeJQCwAIf', 'wNsJvuMlem', 'JdjJ0yfWaK', 'HTWOMU5HZG', 'ChUn3VFYXt', 'Y1rn7CeXec'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, sjGxSN2D3DSb9ZRckQw.csHigh entropy of concatenated method names: 'ShowMessage', 'Yfp26y1pZ3', 'U5q2ZcjaFm', 'Ae12PWjUH0', 'gpT2KgrniZ', 'sXL2M1QRIf', 'Vhq2j06REx', 'zIu2zqwkQv', 'qQR83p3aHE', 'wZ48Wmh9Kf'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, uvKl4jd2pdrDKv5i801.csHigh entropy of concatenated method names: 'mGgd7gOw5e', 'ISwd55nMya', 'VnrdT5iOGo', 'ctGd1h4D41', 'LQtdxnO6bt', 'jGAdpMLYLa', 'vpndCOuAlZ', 'N3kdX97FHp', 'iJSdOgxSZL', 'J7jdnZEpUl'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, qYt2UGWxomMCcArni6L.csHigh entropy of concatenated method names: 'ABHWU0Q5M7', 'subWt2bppy', 'G8pWckTVZR', 'D5GWge2ebs', 'CMTWCfyMjj', 'CfTWXYoR3u', 'V63WOENucu', 'y8RWng56rs', 'dUWWb7psyB', 'tJjWN5IVnM'
    Source: 0.2.loader.exe.39d2d90.8.raw.unpack, ImLCtHJpB7Y34H2qdnG.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'ChUn3VFYXt', 'HTWOMU5HZG', 'bRUnWXH8lY', 'olQnLg4V9M', 'ojUni3EWO6', 'F5gnJo62vD', 'YS1nql2bUi', 'YBiJXVq2wc', 'w39ndGQkM9'
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, pV6W58JtYEixu9F3IDb.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'G7Hn8sA5yr', 'mdCJcYCmWJ', 'lxKJgTVIr9', 'TmeJQCwAIf', 'wNsJvuMlem', 'JdjJ0yfWaK', 'HTWOMU5HZG', 'ChUn3VFYXt', 'Y1rn7CeXec'
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, sjGxSN2D3DSb9ZRckQw.csHigh entropy of concatenated method names: 'ShowMessage', 'Yfp26y1pZ3', 'U5q2ZcjaFm', 'Ae12PWjUH0', 'gpT2KgrniZ', 'sXL2M1QRIf', 'Vhq2j06REx', 'zIu2zqwkQv', 'qQR83p3aHE', 'wZ48Wmh9Kf'
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, uvKl4jd2pdrDKv5i801.csHigh entropy of concatenated method names: 'mGgd7gOw5e', 'ISwd55nMya', 'VnrdT5iOGo', 'ctGd1h4D41', 'LQtdxnO6bt', 'jGAdpMLYLa', 'vpndCOuAlZ', 'N3kdX97FHp', 'iJSdOgxSZL', 'J7jdnZEpUl'
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, qYt2UGWxomMCcArni6L.csHigh entropy of concatenated method names: 'ABHWU0Q5M7', 'subWt2bppy', 'G8pWckTVZR', 'D5GWge2ebs', 'CMTWCfyMjj', 'CfTWXYoR3u', 'V63WOENucu', 'y8RWng56rs', 'dUWWb7psyB', 'tJjWN5IVnM'
    Source: 0.2.loader.exe.2427ee6.3.raw.unpack, ImLCtHJpB7Y34H2qdnG.csHigh entropy of concatenated method names: 'QnAOzlNEKs', 'ChUn3VFYXt', 'HTWOMU5HZG', 'bRUnWXH8lY', 'olQnLg4V9M', 'ojUni3EWO6', 'F5gnJo62vD', 'YS1nql2bUi', 'YBiJXVq2wc', 'w39ndGQkM9'
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\loader.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,
    Source: loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
    Source: loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\
    Source: C:\Users\user\Desktop\loader.exeMemory allocated: 22A0000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\loader.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\loader.exeMemory allocated: 2690000 memory reserve | memory write watchJump to behavior
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
    Source: C:\Users\user\Desktop\loader.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: C:\Users\user\Desktop\loader.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_0-54305
    Source: C:\Users\user\Desktop\loader.exe TID: 6668Thread sleep time: -922337203685477s >= -30000sJump to behavior
    Source: C:\Users\user\Desktop\loader.exeThread delayed: delay time: 922337203685477Jump to behavior
    Source: loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
    Source: loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,
    Source: loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\
    Source: C:\Users\user\Desktop\loader.exeAPI call chain: ExitProcess graph end nodegraph_0-54540
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,CloseHandle,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,0_2_004019F0
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0040ADB0 GetProcessHeap,HeapFree,0_2_0040ADB0
    Source: C:\Users\user\Desktop\loader.exeProcess token adjusted: DebugJump to behavior
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040CE09
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040E61C
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_004123F1 SetUnhandledExceptionFilter,0_2_004123F1
    Source: C:\Users\user\Desktop\loader.exeMemory allocated: page read and write | page guardJump to behavior
    Source: loader.exe, 00000000.00000002.1507826756.0000000002C05000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
    Source: loader.exe, 00000000.00000002.1507826756.0000000002C05000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
    Source: C:\Users\user\Desktop\loader.exeCode function: GetLocaleInfoA,0_2_00417A20
    Source: C:\Users\user\Desktop\loader.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\loader.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\loader.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\loader.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
    Source: C:\Users\user\Desktop\loader.exeCode function: 0_2_00412A15 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00412A15
    Source: C:\Users\user\Desktop\loader.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: loader.exe PID: 4928, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: loader.exe PID: 4928, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Command and Scripting Interpreter
    1
    DLL Side-Loading
    2
    Process Injection
    1
    Masquerading
    11
    Input Capture
    1
    System Time Discovery
    Remote Services11
    Input Capture
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault Accounts2
    Native API
    Boot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Disable or Modify Tools
    LSASS Memory131
    Security Software Discovery
    Remote Desktop Protocol11
    Archive Collected Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
    Virtualization/Sandbox Evasion
    Security Account Manager31
    Virtualization/Sandbox Evasion
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Process Injection
    NTDS2
    Process Discovery
    Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
    Deobfuscate/Decode Files or Information
    LSA Secrets23
    System Information Discovery
    SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
    Obfuscated Files or Information
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
    Software Packing
    DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
    DLL Side-Loading
    Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    loader.exe68%ReversingLabsWin32.Spyware.RedLine
    loader.exe100%AviraTR/Spy.RedLine.urvkn
    loader.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    https://api.ip.sb/ip0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.ip.sb/iploader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalse
    • URL Reputation: safe
    unknown
    https://api.ip.sloader.exe, 00000000.00000002.1507826756.0000000002991000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      https://discord.com/api/v9/users/loader.exe, 00000000.00000002.1507826756.0000000002AB6000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1525820
        Start date and time:2024-10-04 15:15:03 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 22s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:8
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:loader.exe
        Detection:MAL
        Classification:mal88.troj.evad.winEXE@2/1@0/0
        EGA Information:
        • Successful, ratio: 100%
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 36
        • Number of non-executed functions: 31
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
        • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtOpenKeyEx calls found.
        • Report size getting too big, too many NtQueryValueKey calls found.
        • VT rate limit hit for: loader.exe
        No simulations
        No context
        No context
        No context
        No context
        No context
        Process:C:\Users\user\Desktop\loader.exe
        File Type:ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):1119
        Entropy (8bit):5.345080863654519
        Encrypted:false
        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
        MD5:88593431AEF401417595E7A00FE86E5F
        SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
        SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
        SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
        Malicious:true
        Reputation:moderate, very likely benign file
        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
        File type:PE32 executable (console) Intel 80386, for MS Windows
        Entropy (8bit):7.7058622467844184
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:loader.exe
        File size:363'008 bytes
        MD5:b750903ba5abb6ee7528aad139ec6404
        SHA1:9a6107f86b044d6783a202c3f16310d2ca60f149
        SHA256:11f98be1f2418783aec952a9814bbe8c26010554c2662671ab4b18f7e425b4b6
        SHA512:1dccfd19559ce3e96c96b85befccd5237baf057bc7e64e1eefc29f01bd4832fe36c602c74eec430d05be9d2a6dc443441a455af748340c7499944df15d128015
        SSDEEP:6144:aDKW1Lgbdl0TBBvjc/uw7pv5tBsT8/z5vAULpkrVsDv1PPFMmDLze8UD5:ch1Lk70TnvjcWSJ5tGwr5vAULir6r1Hs
        TLSH:CD74E12175C1C2B3C4BA113444EACBBA5A3A30714776D5D7BBED2BB65F212E0A3351CA
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......h..-,q.~,q.~,q.~2#.~?q.~...~+q.~,q.~\q.~2#n~.q.~2#i~.q.~2#{~-q.~Rich,q.~........................PE..L...t..P..........#........
        Icon Hash:f8da8e868e8e9200
        Entrypoint:0x40cd2f
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows cui
        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        DLL Characteristics:TERMINAL_SERVER_AWARE
        Time Stamp:0x5000A574 [Fri Jul 13 22:47:16 2012 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:bf5a4aa99e5b160f8521cadd6bfe73b8
        Instruction
        call 00007F91DD1B0886h
        jmp 00007F91DD1AAA49h
        mov edi, edi
        push ebp
        mov ebp, esp
        sub esp, 20h
        mov eax, dword ptr [ebp+08h]
        push esi
        push edi
        push 00000008h
        pop ecx
        mov esi, 0041F058h
        lea edi, dword ptr [ebp-20h]
        rep movsd
        mov dword ptr [ebp-08h], eax
        mov eax, dword ptr [ebp+0Ch]
        pop edi
        mov dword ptr [ebp-04h], eax
        pop esi
        test eax, eax
        je 00007F91DD1AABAEh
        test byte ptr [eax], 00000008h
        je 00007F91DD1AABA9h
        mov dword ptr [ebp-0Ch], 01994000h
        lea eax, dword ptr [ebp-0Ch]
        push eax
        push dword ptr [ebp-10h]
        push dword ptr [ebp-1Ch]
        push dword ptr [ebp-20h]
        call dword ptr [0041B000h]
        leave
        retn 0008h
        ret
        mov eax, 00413563h
        mov dword ptr [004228E4h], eax
        mov dword ptr [004228E8h], 00412C4Ah
        mov dword ptr [004228ECh], 00412BFEh
        mov dword ptr [004228F0h], 00412C37h
        mov dword ptr [004228F4h], 00412BA0h
        mov dword ptr [004228F8h], eax
        mov dword ptr [004228FCh], 004134DBh
        mov dword ptr [00422900h], 00412BBCh
        mov dword ptr [00422904h], 00412B1Eh
        mov dword ptr [00422908h], 00412AABh
        ret
        mov edi, edi
        push ebp
        mov ebp, esp
        call 00007F91DD1AAB3Bh
        call 00007F91DD1B13C0h
        cmp dword ptr [ebp+00h], 00000000h
        Programming Language:
        • [ASM] VS2008 build 21022
        • [IMP] VS2005 build 50727
        • [C++] VS2008 build 21022
        • [ C ] VS2008 build 21022
        • [LNK] VS2008 build 21022
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x215b40x50.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x368d4.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
        IMAGE_DIRECTORY_ENTRY_DEBUG0x1b1c00x1c.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x20da00x40.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x1b0000x184.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x197180x19800ecbabfdf66cefaa7393d1b46f933edc4False0.5789483762254902data6.748549779726586IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x1b0000x6db40x6e005826801f33fc1b607aa8e942aa92e9faFalse0.5467329545454546data6.442956247632331IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x220000x30c00x16002fe51a72ede820cd7cf55a77ba59b1f4False0.3126775568181818data3.2625868398009703IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .rsrc0x260000x368d40x36a0005c6368bb687350e8592913e7db6b4b4False0.9936445223112128data7.9945096700687674IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x261b40xf279PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9934109838416059
        RT_RCDATA0x354300x26f6fdata1.0003508793914748
        RT_RCDATA0x5c3a00x20Non-ISO extended-ASCII text, with no line terminators, with escape sequences1.34375
        RT_GROUP_ICON0x5c3c00x14data1.05
        RT_VERSION0x5c3d40x312data0.45165394402035625
        RT_MANIFEST0x5c6e80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        KERNEL32.dllRaiseException, GetLastError, MultiByteToWideChar, lstrlenA, InterlockedDecrement, GetProcAddress, LoadLibraryA, FreeResource, SizeofResource, LockResource, LoadResource, FindResourceA, GetModuleHandleA, Module32Next, CloseHandle, Module32First, CreateToolhelp32Snapshot, GetCurrentProcessId, SetEndOfFile, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, GetLocaleInfoA, HeapFree, GetProcessHeap, HeapAlloc, GetCommandLineA, HeapCreate, VirtualFree, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, VirtualAlloc, HeapReAlloc, HeapSize, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetModuleHandleW, Sleep, ExitProcess, WriteFile, GetStdHandle, GetModuleFileNameA, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, ReadFile, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, FlushFileBuffers, SetFilePointer, SetHandleCount, GetFileType, GetStartupInfoA, RtlUnwind, FreeEnvironmentStringsA, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, QueryPerformanceCounter, GetTickCount, GetSystemTimeAsFileTime, InitializeCriticalSectionAndSpinCount, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, CompareStringA, CompareStringW, SetEnvironmentVariableA, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, SetStdHandle, CreateFileA
        ole32.dllOleInitialize
        OLEAUT32.dllSafeArrayCreate, SafeArrayAccessData, SafeArrayUnaccessData, SafeArrayDestroy, SafeArrayCreateVector, VariantClear, VariantInit, SysFreeString, SysAllocString
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:09:16:17
        Start date:04/10/2024
        Path:C:\Users\user\Desktop\loader.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\loader.exe"
        Imagebase:0x400000
        File size:363'008 bytes
        MD5 hash:B750903BA5ABB6EE7528AAD139EC6404
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:1
        Start time:09:16:17
        Start date:04/10/2024
        Path:C:\Windows\System32\conhost.exe
        Wow64 process (32bit):false
        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Imagebase:0x7ff620390000
        File size:862'208 bytes
        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >

          Execution Graph

          Execution Coverage:12.6%
          Dynamic/Decrypted Code Coverage:74.2%
          Signature Coverage:5.6%
          Total number of Nodes:858
          Total number of Limit Nodes:66
          execution_graph 54564 2913c31 54565 2913c6e 54564->54565 54566 2913da0 54565->54566 54569 29131d4 54565->54569 54568 2913e7b 54570 29131df 54569->54570 54571 2913fae 54570->54571 54572 2913f1e 54570->54572 54577 2913f9e 54570->54577 54582 291c6a6 54571->54582 54586 291c6a8 54571->54586 54574 2913f84 54572->54574 54590 2913204 54572->54590 54573 2913fbf 54578 291c6a6 PostMessageW 54573->54578 54579 291c6a8 PostMessageW 54573->54579 54576 2913204 SendMessageW 54574->54576 54576->54577 54577->54568 54578->54577 54579->54577 54583 291c6b8 54582->54583 54595 2918c00 54583->54595 54587 291c6b8 54586->54587 54588 2918c00 PostMessageW 54587->54588 54589 291c6c9 54588->54589 54589->54573 54592 291320f 54590->54592 54591 291de9e 54591->54574 54592->54591 54593 291ded3 SendMessageW 54592->54593 54594 291df54 54593->54594 54594->54574 54596 291c6e0 PostMessageW 54595->54596 54597 291c6c9 54596->54597 54597->54573 53766 291e950 53767 291e995 GetClassInfoW 53766->53767 53769 291e9db 53767->53769 54598 22efc0d 54599 22efc18 54598->54599 54602 291f809 54598->54602 54607 291f818 54598->54607 54603 291f82a 54602->54603 54604 291f867 54603->54604 54612 291fa10 54603->54612 54617 291fa20 54603->54617 54604->54599 54609 291f82a 54607->54609 54608 291f867 54608->54599 54609->54608 54610 291fa10 2 API calls 54609->54610 54611 291fa20 2 API calls 54609->54611 54610->54608 54611->54608 54613 291fa43 54612->54613 54614 291fb78 54613->54614 54622 291fdb0 54613->54622 54627 291fda0 54613->54627 54614->54604 54618 291fa43 54617->54618 54619 291fb78 54618->54619 54620 291fdb0 2 API calls 54618->54620 54621 291fda0 2 API calls 54618->54621 54619->54604 54620->54619 54621->54619 54623 291fdc5 54622->54623 54624 291fdd1 54623->54624 54632 69e04d0 54623->54632 54636 69e04c1 54623->54636 54624->54614 54628 291fdc5 54627->54628 54629 291fdd1 54628->54629 54630 69e04d0 2 API calls 54628->54630 54631 69e04c1 2 API calls 54628->54631 54629->54614 54630->54629 54631->54629 54633 69e04f2 54632->54633 54641 69e0838 54633->54641 54634 69e0556 54634->54624 54637 69e04c6 54636->54637 54638 69e0462 54636->54638 54639 69e0838 2 API calls 54637->54639 54638->54624 54640 69e0556 54639->54640 54640->54624 54642 69e0864 54641->54642 54646 69e74a8 54642->54646 54650 69e74b0 54642->54650 54643 69e08b8 54643->54634 54647 69e74ee GetConsoleWindow 54646->54647 54649 69e751e 54647->54649 54649->54643 54651 69e74ee GetConsoleWindow 54650->54651 54653 69e751e 54651->54653 54653->54643 54654 27ba71e 54655 27ba723 54654->54655 54656 27ba745 54655->54656 54657 27b9140 4 API calls 54655->54657 54657->54656 54658 22ed848 DuplicateHandle 54659 22ed8de 54658->54659 54660 77d01c 54661 77d034 54660->54661 54662 77d08e 54661->54662 54666 27b12fc 3 API calls 54661->54666 54667 27b2da9 54661->54667 54676 27b2038 54661->54676 54680 27b2048 54661->54680 54666->54662 54670 27b2de5 54667->54670 54668 27b2e19 54669 27b1424 3 API calls 54668->54669 54672 27b2e17 54669->54672 54670->54668 54671 27b2e09 54670->54671 54673 27b300c 3 API calls 54671->54673 54674 27b2f40 3 API calls 54671->54674 54675 27b2f30 3 API calls 54671->54675 54673->54672 54674->54672 54675->54672 54677 27b206e 54676->54677 54678 27b12fc 3 API calls 54677->54678 54679 27b208f 54678->54679 54679->54662 54681 27b206e 54680->54681 54682 27b12fc 3 API calls 54681->54682 54683 27b208f 54682->54683 54683->54662 54684 22ed600 54685 22ed646 GetCurrentProcess 54684->54685 54687 22ed698 GetCurrentThread 54685->54687 54688 22ed691 54685->54688 54689 22ed6ce 54687->54689 54690 22ed6d5 GetCurrentProcess 54687->54690 54688->54687 54689->54690 54693 22ed70b 54690->54693 54691 22ed733 GetCurrentThreadId 54692 22ed764 54691->54692 54693->54691 54694 27b45c8 54695 27b45d8 54694->54695 54700 291afa9 54695->54700 54706 27b5eb4 54695->54706 54712 291afb8 54695->54712 54696 27b4601 54701 291afed 54700->54701 54705 27b5eb4 4 API calls 54701->54705 54702 291b042 54718 2913158 SendMessageW PostMessageW 54702->54718 54704 291b049 54704->54696 54705->54702 54707 27b5ebd 54706->54707 54710 27b5edb 54706->54710 54708 27b4740 4 API calls 54707->54708 54707->54710 54708->54710 54709 27b6014 54709->54696 54710->54709 54711 27b4740 4 API calls 54710->54711 54711->54709 54713 291afed 54712->54713 54717 27b5eb4 4 API calls 54713->54717 54714 291b042 54719 2913158 SendMessageW PostMessageW 54714->54719 54716 291b049 54716->54696 54717->54714 54718->54704 54719->54716 53770 291b3c8 53771 291b3e2 53770->53771 53775 291a378 53771->53775 53781 291a368 53771->53781 53772 291b46c 53776 291a3be 53775->53776 53777 291a3e1 53776->53777 53787 27b4450 53776->53787 53794 27b1424 53776->53794 53801 27b13f7 53776->53801 53777->53772 53782 291a378 53781->53782 53783 291a3e1 53782->53783 53784 27b4450 3 API calls 53782->53784 53785 27b13f7 3 API calls 53782->53785 53786 27b1424 3 API calls 53782->53786 53783->53772 53784->53783 53785->53783 53786->53783 53788 27b4453 53787->53788 53793 27b44a9 53787->53793 53789 27b454c 53788->53789 53790 27b44a2 53788->53790 53808 27b12fc 53789->53808 53792 27b44fa CallWindowProcW 53790->53792 53790->53793 53792->53793 53793->53777 53795 27b142f 53794->53795 53796 27b454c 53795->53796 53797 27b44a2 53795->53797 53798 27b12fc 2 API calls 53796->53798 53799 27b44fa CallWindowProcW 53797->53799 53800 27b44a9 53797->53800 53798->53800 53799->53800 53800->53777 53802 27b142f 53801->53802 53803 27b454c 53802->53803 53804 27b44a2 53802->53804 53805 27b12fc 2 API calls 53803->53805 53806 27b44fa CallWindowProcW 53804->53806 53807 27b44a9 53804->53807 53805->53807 53806->53807 53807->53777 53809 27b1307 53808->53809 53810 27b2e19 53809->53810 53812 27b2e09 53809->53812 53811 27b1424 3 API calls 53810->53811 53813 27b2e17 53811->53813 53817 27b300c 53812->53817 53823 27b2f30 53812->53823 53828 27b2f40 53812->53828 53818 27b2fca 53817->53818 53819 27b301a 53817->53819 53833 27b2ff8 53818->53833 53840 27b2fe8 53818->53840 53820 27b2fe0 53820->53813 53825 27b2f54 53823->53825 53824 27b2fe0 53824->53813 53826 27b2ff8 3 API calls 53825->53826 53827 27b2fe8 3 API calls 53825->53827 53826->53824 53827->53824 53830 27b2f54 53828->53830 53829 27b2fe0 53829->53813 53831 27b2ff8 3 API calls 53830->53831 53832 27b2fe8 3 API calls 53830->53832 53831->53829 53832->53829 53834 27b3009 53833->53834 53847 2919cf7 53833->53847 53866 27b4430 53833->53866 53869 291ea08 53833->53869 53874 291ea18 53833->53874 53879 2919d08 53833->53879 53834->53820 53841 27b3009 53840->53841 53842 2919cf7 3 API calls 53840->53842 53843 2919d08 3 API calls 53840->53843 53844 291ea18 3 API calls 53840->53844 53845 291ea08 3 API calls 53840->53845 53846 27b4430 3 API calls 53840->53846 53841->53820 53842->53841 53843->53841 53844->53841 53845->53841 53846->53841 53848 2919d21 53847->53848 53859 2919d3d 53847->53859 53849 2919d26 53848->53849 53850 2919d68 53848->53850 53851 2919d42 53849->53851 53852 2919d2b 53849->53852 53855 2919ff4 53850->53855 53850->53859 53851->53859 53861 2919fbc 53851->53861 53863 2919e6e 53851->53863 53853 2919f52 53852->53853 53854 2919d34 53852->53854 53898 2919720 53853->53898 53856 2919fca 53854->53856 53854->53859 53906 29197d0 53855->53906 53920 29197a0 CallWindowProcW CallWindowProcW CallWindowProcW 53856->53920 53859->53863 53910 291a2d8 53859->53910 53915 291a2c8 53859->53915 53902 2919790 53861->53902 53863->53834 53867 27b1424 3 API calls 53866->53867 53868 27b444a 53867->53868 53868->53834 53870 291ea26 53869->53870 53871 291ea58 53869->53871 53872 291ea2d 53870->53872 53937 291ea71 53870->53937 53871->53834 53872->53834 53875 291ea26 53874->53875 53876 291ea58 53874->53876 53877 291ea2d 53875->53877 53878 291ea71 3 API calls 53875->53878 53876->53834 53877->53834 53878->53877 53880 2919d21 53879->53880 53891 2919d3d 53879->53891 53881 2919d26 53880->53881 53882 2919d68 53880->53882 53883 2919d42 53881->53883 53884 2919d2b 53881->53884 53887 2919ff4 53882->53887 53882->53891 53883->53891 53893 2919fbc 53883->53893 53895 2919e6e 53883->53895 53885 2919f52 53884->53885 53886 2919d34 53884->53886 53889 2919720 3 API calls 53885->53889 53888 2919fca 53886->53888 53886->53891 53890 29197d0 3 API calls 53887->53890 53943 29197a0 CallWindowProcW CallWindowProcW CallWindowProcW 53888->53943 53889->53895 53890->53895 53891->53895 53896 291a2d8 3 API calls 53891->53896 53897 291a2c8 3 API calls 53891->53897 53894 2919790 3 API calls 53893->53894 53894->53895 53895->53834 53896->53895 53897->53895 53899 291972b 53898->53899 53900 291a2d8 3 API calls 53899->53900 53901 291a4ee 53900->53901 53901->53863 53903 291979b 53902->53903 53904 291a2d8 3 API calls 53903->53904 53905 291f804 53904->53905 53905->53863 53907 29197db 53906->53907 53908 291a2d8 3 API calls 53907->53908 53909 291b4a1 53908->53909 53909->53863 53911 291a2ea 53910->53911 53912 291a2e3 53910->53912 53921 291a2f8 53911->53921 53912->53863 53913 291a2f0 53913->53863 53916 291a2d6 53915->53916 53917 291a2e3 53915->53917 53916->53917 53919 291a2f8 3 API calls 53916->53919 53917->53863 53918 291a2f0 53918->53863 53919->53918 53920->53863 53922 291a316 53921->53922 53924 291a338 53921->53924 53923 291a324 53922->53923 53927 27b3828 53922->53927 53932 27b3818 53922->53932 53923->53913 53924->53913 53929 27b3874 53927->53929 53928 27b3b14 53928->53923 53929->53928 53930 291a378 3 API calls 53929->53930 53931 291a368 3 API calls 53929->53931 53930->53928 53931->53928 53934 27b3874 53932->53934 53933 27b3b14 53933->53923 53934->53933 53935 291a378 3 API calls 53934->53935 53936 291a368 3 API calls 53934->53936 53935->53933 53936->53933 53938 291eaa6 53937->53938 53939 291eadb 53937->53939 53938->53872 53939->53938 53940 27b3828 3 API calls 53939->53940 53941 27b3818 3 API calls 53939->53941 53942 27b4430 3 API calls 53939->53942 53940->53938 53941->53938 53942->53938 53943->53895 54720 291dfe8 54721 291dff8 54720->54721 54722 291e00a 54721->54722 54724 27b2098 54721->54724 54725 27b20fa 54724->54725 54726 27b20a7 54724->54726 54728 27b2109 SetWindowLongW 54725->54728 54726->54722 54729 27b2144 54728->54729 54730 291f4a8 54731 291f4cf 54730->54731 54732 291f530 54731->54732 54733 22ed46c 3 API calls 54731->54733 54735 22efa37 54731->54735 54733->54732 54736 22ee250 3 API calls 54735->54736 54737 22efa6f 54735->54737 54736->54737 54737->54732 54738 291b068 54739 291b0b0 SetWindowTextW 54738->54739 54740 291b0aa 54738->54740 54741 291b0e1 54739->54741 54740->54739 53944 27b6a60 53945 27b6a84 53944->53945 53957 27b66cc 53945->53957 53949 27b6afb 53965 27b66fc 53949->53965 53951 27b6b51 53969 27b674c 53951->53969 53953 27b6c16 53973 27bbd40 53953->53973 53978 27bbd3e 53953->53978 53954 27b6c36 53958 27b66d7 53957->53958 53983 27b67cc 53958->53983 53960 27b6a9f 53961 27b66dc 53960->53961 53962 27b66e7 53961->53962 54196 27b696c 53962->54196 53964 27b7086 53964->53949 53966 27b6707 53965->53966 53967 27b9927 53966->53967 53968 27b696c 4 API calls 53966->53968 53967->53951 53968->53967 53970 27b6757 53969->53970 54239 27b9140 53970->54239 53974 27bbd55 53973->53974 53976 27bbe10 53974->53976 54254 27bbefd 53974->54254 53975 27bbde5 53975->53954 53979 27bbd55 53978->53979 53981 27bbe10 53979->53981 53982 27bbefd 5 API calls 53979->53982 53980 27bbde5 53980->53954 53982->53980 53984 27b67d7 53983->53984 53988 22e619c 53984->53988 53994 22e88c8 53984->53994 53985 27b6da4 53985->53960 53989 22e61a7 53988->53989 53991 22e8b8b 53989->53991 54000 22eb238 53989->54000 53990 22e8bc9 53990->53985 53991->53990 54004 22ecf21 53991->54004 53995 22e8903 53994->53995 53997 22e8b8b 53995->53997 53998 22eb238 GetModuleHandleW 53995->53998 53996 22e8bc9 53996->53985 53997->53996 53999 22ecf21 8 API calls 53997->53999 53998->53997 53999->53996 54009 22eb260 54000->54009 54013 22eb270 54000->54013 54001 22eb24e 54001->53991 54005 22ecf51 54004->54005 54006 22ecf75 54005->54006 54021 22ed4e8 54005->54021 54025 22ed4d9 54005->54025 54006->53990 54010 22eb26f 54009->54010 54011 22eb27f 54009->54011 54016 22eb358 54010->54016 54011->54001 54014 22eb27f 54013->54014 54015 22eb358 GetModuleHandleW 54013->54015 54014->54001 54015->54014 54017 22eb39c 54016->54017 54018 22eb379 54016->54018 54017->54011 54018->54017 54019 22eb5a0 GetModuleHandleW 54018->54019 54020 22eb5cd 54019->54020 54020->54011 54022 22ed4f5 54021->54022 54023 22ed52f 54022->54023 54029 22ed320 54022->54029 54023->54006 54026 22ed4f5 54025->54026 54027 22ed52f 54026->54027 54028 22ed320 8 API calls 54026->54028 54027->54006 54028->54027 54030 22ed325 54029->54030 54032 22ede40 54030->54032 54033 22ed44c 54030->54033 54032->54032 54034 22ed457 54033->54034 54035 22e619c 8 API calls 54034->54035 54036 22edeaf 54035->54036 54047 22ee330 54036->54047 54060 22ee534 54036->54060 54037 22edebe 54038 22ed45c CreateWindowExW GetConsoleWindow GetConsoleWindow 54037->54038 54039 22eded8 54038->54039 54040 22ed46c CreateWindowExW GetConsoleWindow GetConsoleWindow 54039->54040 54041 22ededf 54040->54041 54043 22efc28 CreateWindowExW 54041->54043 54044 22efc40 CreateWindowExW 54041->54044 54042 22edee9 54042->54032 54043->54042 54044->54042 54048 22ee35e 54047->54048 54049 22ee42f 54048->54049 54053 22ee63a 54048->54053 54054 22ee49b 54048->54054 54065 27b46f8 54048->54065 54073 27b4732 54048->54073 54080 27b4740 54048->54080 54049->54054 54095 22ed46c 54049->54095 54051 22ee3d6 54052 22ee42a KiUserCallbackDispatcher 54051->54052 54052->54049 54054->54053 54087 291e548 54054->54087 54091 291e558 54054->54091 54062 22ee551 54060->54062 54061 22ee63a 54061->54061 54062->54061 54063 291e558 3 API calls 54062->54063 54064 291e548 3 API calls 54062->54064 54063->54061 54064->54061 54066 27b4762 54065->54066 54067 27b46fb 54065->54067 54068 27b478d 54066->54068 54099 2919a10 54066->54099 54119 291996b 54066->54119 54139 2919948 54066->54139 54160 2919a00 54066->54160 54067->54051 54068->54051 54074 27b4750 54073->54074 54075 27b478d 54074->54075 54076 2919a10 4 API calls 54074->54076 54077 2919a00 4 API calls 54074->54077 54078 2919948 4 API calls 54074->54078 54079 291996b 4 API calls 54074->54079 54075->54051 54076->54075 54077->54075 54078->54075 54079->54075 54081 27b4750 54080->54081 54082 27b478d 54081->54082 54083 2919a10 4 API calls 54081->54083 54084 2919a00 4 API calls 54081->54084 54085 2919948 4 API calls 54081->54085 54086 291996b 4 API calls 54081->54086 54082->54051 54083->54082 54084->54082 54085->54082 54086->54082 54088 291e582 54087->54088 54180 291e83f 54088->54180 54089 291e5a5 54089->54053 54092 291e582 54091->54092 54094 291e83f 3 API calls 54092->54094 54093 291e5a5 54093->54053 54094->54093 54096 22ed477 54095->54096 54186 22ee250 54096->54186 54098 22efa6f 54098->54054 54100 2919a49 54099->54100 54104 2919ae7 54100->54104 54117 22efc28 CreateWindowExW 54100->54117 54118 22efc40 CreateWindowExW 54100->54118 54101 2918c3c CreateWindowExW 54102 2919b53 54101->54102 54103 29131d4 SendMessageW PostMessageW 54102->54103 54105 2919b5d 54103->54105 54104->54101 54106 291961c CreateWindowExW 54105->54106 54107 2919c7d 54105->54107 54108 2919c24 54106->54108 54108->54107 54109 291961c CreateWindowExW 54108->54109 54110 2919c4f 54109->54110 54110->54107 54111 291961c CreateWindowExW 54110->54111 54112 2919c60 54111->54112 54113 2913204 SendMessageW 54112->54113 54114 2919c6f 54113->54114 54115 291de80 SendMessageW 54114->54115 54116 2913204 SendMessageW 54114->54116 54115->54107 54116->54107 54117->54104 54118->54104 54120 2919971 54119->54120 54124 2919ae7 54120->54124 54137 22efc28 CreateWindowExW 54120->54137 54138 22efc40 CreateWindowExW 54120->54138 54121 2918c3c CreateWindowExW 54122 2919b53 54121->54122 54123 29131d4 SendMessageW PostMessageW 54122->54123 54125 2919b5d 54123->54125 54124->54121 54126 291961c CreateWindowExW 54125->54126 54127 2919c7d 54125->54127 54128 2919c24 54126->54128 54127->54127 54128->54127 54129 291961c CreateWindowExW 54128->54129 54130 2919c4f 54129->54130 54130->54127 54131 291961c CreateWindowExW 54130->54131 54132 2919c60 54131->54132 54133 2913204 SendMessageW 54132->54133 54134 2919c6f 54133->54134 54135 291de80 SendMessageW 54134->54135 54136 2913204 SendMessageW 54134->54136 54135->54127 54136->54127 54137->54124 54138->54124 54141 2919949 54139->54141 54140 2919960 54140->54068 54141->54140 54145 2919ae7 54141->54145 54158 22efc28 CreateWindowExW 54141->54158 54159 22efc40 CreateWindowExW 54141->54159 54142 2918c3c CreateWindowExW 54143 2919b53 54142->54143 54144 29131d4 SendMessageW PostMessageW 54143->54144 54146 2919b5d 54144->54146 54145->54142 54147 291961c CreateWindowExW 54146->54147 54148 2919c7d 54146->54148 54149 2919c24 54147->54149 54149->54148 54150 291961c CreateWindowExW 54149->54150 54151 2919c4f 54150->54151 54151->54148 54152 291961c CreateWindowExW 54151->54152 54153 2919c60 54152->54153 54154 2913204 SendMessageW 54153->54154 54155 2919c6f 54154->54155 54156 291de80 SendMessageW 54155->54156 54157 2913204 SendMessageW 54155->54157 54156->54148 54157->54148 54158->54145 54159->54145 54161 2919a49 54160->54161 54165 2919ae7 54161->54165 54178 22efc28 CreateWindowExW 54161->54178 54179 22efc40 CreateWindowExW 54161->54179 54162 2918c3c CreateWindowExW 54163 2919b53 54162->54163 54164 29131d4 SendMessageW PostMessageW 54163->54164 54167 2919b5d 54164->54167 54165->54162 54166 2919c7d 54167->54166 54168 291961c CreateWindowExW 54167->54168 54169 2919c24 54168->54169 54169->54166 54170 291961c CreateWindowExW 54169->54170 54171 2919c4f 54170->54171 54171->54166 54172 291961c CreateWindowExW 54171->54172 54173 2919c60 54172->54173 54174 2913204 SendMessageW 54173->54174 54175 2919c6f 54174->54175 54176 291de80 SendMessageW 54175->54176 54177 2913204 SendMessageW 54175->54177 54176->54166 54177->54166 54178->54165 54179->54165 54181 291e89f 54180->54181 54182 291e84f 54180->54182 54181->54089 54184 22eefb8 CreateWindowExW GetConsoleWindow GetConsoleWindow 54182->54184 54185 22eefc8 CreateWindowExW GetConsoleWindow GetConsoleWindow 54182->54185 54183 291e894 54183->54089 54184->54183 54185->54183 54188 22ee25b 54186->54188 54187 22efc18 54187->54098 54188->54187 54191 22efb42 54188->54191 54192 22efc28 CreateWindowExW 54188->54192 54193 22efc40 CreateWindowExW 54188->54193 54189 22efbe1 54194 291f809 GetConsoleWindow GetConsoleWindow 54189->54194 54195 291f818 GetConsoleWindow GetConsoleWindow 54189->54195 54190 22ee250 CreateWindowExW GetConsoleWindow GetConsoleWindow 54190->54191 54191->54189 54191->54190 54192->54191 54193->54191 54194->54187 54195->54187 54197 27b6977 54196->54197 54198 27b7140 54197->54198 54205 27bac08 54197->54205 54215 27b7150 54197->54215 54219 27b7160 54197->54219 54223 27baca0 54197->54223 54231 27bacb0 54197->54231 54198->53964 54199 27b710a 54199->53964 54207 27bac13 54205->54207 54208 27bac7a 54205->54208 54206 27bac84 54206->54199 54207->54199 54208->54206 54209 27baf16 54208->54209 54212 27baef5 54208->54212 54210 27b7160 4 API calls 54209->54210 54211 27baf29 54210->54211 54211->54199 54213 27b7160 4 API calls 54212->54213 54214 27baf0c 54213->54214 54214->54199 54216 27b718f 54215->54216 54217 27b4740 4 API calls 54216->54217 54218 27b7216 54216->54218 54217->54218 54221 27b718f 54219->54221 54220 27b7216 54221->54220 54222 27b4740 4 API calls 54221->54222 54222->54220 54227 27baca3 54223->54227 54224 27baf16 54225 27b7160 4 API calls 54224->54225 54226 27baf29 54225->54226 54226->54199 54227->54224 54228 27baef5 54227->54228 54229 27b7160 4 API calls 54228->54229 54230 27baf0c 54229->54230 54230->54199 54235 27bacd7 54231->54235 54232 27baf16 54233 27b7160 4 API calls 54232->54233 54234 27baf29 54233->54234 54234->54199 54235->54232 54236 27baef5 54235->54236 54237 27b7160 4 API calls 54236->54237 54238 27baf0c 54237->54238 54238->54199 54240 27b9145 54239->54240 54244 27ba770 54240->54244 54247 27ba780 54240->54247 54241 27ba745 54241->53953 54250 27ba858 54244->54250 54248 27ba7be 54247->54248 54249 27ba858 4 API calls 54247->54249 54248->54241 54249->54248 54251 27ba884 54250->54251 54252 27b66fc 4 API calls 54251->54252 54253 27ba7be 54252->54253 54253->54241 54255 27bbf14 54254->54255 54261 27bbf1b 54254->54261 54255->53975 54256 27bbf6e 54256->53975 54257 27bc24a 54259 27b4740 4 API calls 54257->54259 54258 27bc25f GetCurrentThreadId 54260 27bc251 54258->54260 54259->54260 54260->53975 54261->54256 54261->54257 54261->54258 54262 40cbdd 54263 40cbe9 type_info::_Type_info_dtor 54262->54263 54303 40d534 HeapCreate 54263->54303 54266 40cc46 54305 41087e GetModuleHandleW 54266->54305 54270 40cc57 __RTC_Initialize 54339 411a15 54270->54339 54273 40cc66 54274 40cc72 GetCommandLineA 54273->54274 54413 40e79a 62 API calls 3 library calls 54273->54413 54354 412892 71 API calls 3 library calls 54274->54354 54277 40cc71 54277->54274 54278 40cc82 54414 4127d7 82 API calls 3 library calls 54278->54414 54280 40cc8c 54281 40cc90 54280->54281 54282 40cc98 54280->54282 54415 40e79a 62 API calls 3 library calls 54281->54415 54355 41255f 81 API calls 6 library calls 54282->54355 54285 40cc9d 54287 40cca1 54285->54287 54288 40cca9 54285->54288 54286 40cc97 54286->54282 54416 40e79a 62 API calls 3 library calls 54287->54416 54356 40e859 73 API calls 5 library calls 54288->54356 54291 40cca8 54291->54288 54292 40ccb0 54293 40ccb5 54292->54293 54294 40ccbc 54292->54294 54417 40e79a 62 API calls 3 library calls 54293->54417 54357 4019f0 OleInitialize 54294->54357 54297 40ccbb 54297->54294 54298 40ccd8 54299 40ccea 54298->54299 54418 40ea0a 62 API calls _doexit 54298->54418 54419 40ea36 62 API calls _doexit 54299->54419 54302 40ccef type_info::_Type_info_dtor 54304 40cc3a 54303->54304 54304->54266 54411 40cbb4 62 API calls 3 library calls 54304->54411 54306 410892 54305->54306 54307 410899 54305->54307 54420 40e76a Sleep GetModuleHandleW 54306->54420 54309 410a01 54307->54309 54310 4108a3 GetProcAddress GetProcAddress GetProcAddress GetProcAddress 54307->54310 54436 410598 7 API calls __decode_pointer 54309->54436 54313 4108ec TlsAlloc 54310->54313 54311 410898 54311->54307 54315 40cc4c 54313->54315 54316 41093a TlsSetValue 54313->54316 54315->54270 54412 40cbb4 62 API calls 3 library calls 54315->54412 54316->54315 54317 41094b 54316->54317 54421 40ea54 6 API calls 4 library calls 54317->54421 54319 410950 54422 41046e 6 API calls __crt_waiting_on_module_handle 54319->54422 54321 41095b 54423 41046e 6 API calls __crt_waiting_on_module_handle 54321->54423 54323 41096b 54424 41046e 6 API calls __crt_waiting_on_module_handle 54323->54424 54325 41097b 54425 41046e 6 API calls __crt_waiting_on_module_handle 54325->54425 54327 41098b 54426 40d564 InitializeCriticalSectionAndSpinCount __getstream 54327->54426 54329 410998 54329->54309 54427 4104e9 6 API calls __crt_waiting_on_module_handle 54329->54427 54331 4109ac 54331->54309 54428 411cba 54331->54428 54335 4109df 54335->54309 54336 4109e6 54335->54336 54435 4105d5 62 API calls 5 library calls 54336->54435 54338 4109ee GetCurrentThreadId 54338->54315 54456 40e1d8 54339->54456 54341 411a21 GetStartupInfoA 54342 411cba __calloc_crt 62 API calls 54341->54342 54344 411a42 54342->54344 54343 411c60 type_info::_Type_info_dtor 54343->54273 54344->54343 54345 411ba7 54344->54345 54347 411cba __calloc_crt 62 API calls 54344->54347 54350 411b2a 54344->54350 54345->54343 54346 411bdd GetStdHandle 54345->54346 54348 411c42 SetHandleCount 54345->54348 54349 411bef GetFileType 54345->54349 54458 41389c InitializeCriticalSectionAndSpinCount type_info::_Type_info_dtor 54345->54458 54346->54345 54347->54344 54348->54343 54349->54345 54350->54343 54350->54345 54351 411b53 GetFileType 54350->54351 54457 41389c InitializeCriticalSectionAndSpinCount type_info::_Type_info_dtor 54350->54457 54351->54350 54354->54278 54355->54285 54356->54292 54358 401ab9 54357->54358 54459 40b99e 54358->54459 54360 401abf 54361 401acd GetCurrentProcessId CreateToolhelp32Snapshot Module32First 54360->54361 54391 402467 54360->54391 54362 401dc3 CloseHandle GetModuleHandleA 54361->54362 54370 401c55 54361->54370 54472 401650 54362->54472 54364 401e8b FindResourceA LoadResource LockResource SizeofResource 54474 40b84d 54364->54474 54368 401c9c CloseHandle 54368->54298 54369 401ecb _memset 54371 401efc SizeofResource 54369->54371 54370->54368 54374 401cf9 Module32Next 54370->54374 54372 401f1c 54371->54372 54373 401f5f 54371->54373 54372->54373 54530 401560 __VEC_memcpy __cftoe2_l 54372->54530 54375 401f92 _memset 54373->54375 54531 401560 __VEC_memcpy __cftoe2_l 54373->54531 54374->54362 54385 401d0f 54374->54385 54378 401fa2 FreeResource 54375->54378 54379 40b84d _malloc 62 API calls 54378->54379 54380 401fbb SizeofResource 54379->54380 54381 401fe5 _memset 54380->54381 54382 4020aa LoadLibraryA 54381->54382 54383 401650 54382->54383 54384 40216c GetProcAddress 54383->54384 54387 4021aa 54384->54387 54384->54391 54385->54368 54386 401dad Module32Next 54385->54386 54386->54362 54386->54385 54387->54391 54504 4018f0 54387->54504 54389 40243f 54389->54391 54532 40b6b5 62 API calls 2 library calls 54389->54532 54391->54298 54392 4021f1 54392->54389 54516 401870 54392->54516 54394 402269 VariantInit 54395 401870 75 API calls 54394->54395 54396 40228b VariantInit 54395->54396 54397 4022a7 54396->54397 54398 4022d9 SafeArrayCreate SafeArrayAccessData 54397->54398 54521 40b350 54398->54521 54401 40232c 54402 402354 SafeArrayDestroy 54401->54402 54410 40235b 54401->54410 54402->54410 54403 402392 SafeArrayCreateVector 54404 4023a4 54403->54404 54405 4023bc VariantClear VariantClear 54404->54405 54523 4019a0 54405->54523 54408 40242e 54409 4019a0 65 API calls 54408->54409 54409->54389 54410->54403 54411->54266 54412->54270 54413->54277 54414->54280 54415->54286 54416->54291 54417->54297 54418->54299 54419->54302 54420->54311 54421->54319 54422->54321 54423->54323 54424->54325 54425->54327 54426->54329 54427->54331 54430 411cc3 54428->54430 54431 4109c5 54430->54431 54432 411ce1 Sleep 54430->54432 54437 40e231 54430->54437 54431->54309 54434 4104e9 6 API calls __crt_waiting_on_module_handle 54431->54434 54433 411cf6 54432->54433 54433->54430 54433->54431 54434->54335 54435->54338 54438 40e23d type_info::_Type_info_dtor 54437->54438 54439 40e255 54438->54439 54449 40e274 _memset 54438->54449 54450 40bfc1 62 API calls __getptd_noexit 54439->54450 54441 40e25a 54451 40e744 6 API calls 2 library calls 54441->54451 54443 40e2e6 HeapAlloc 54443->54449 54446 40e26a type_info::_Type_info_dtor 54446->54430 54449->54443 54449->54446 54452 40d6e0 62 API calls 2 library calls 54449->54452 54453 40def2 5 API calls 2 library calls 54449->54453 54454 40e32d LeaveCriticalSection _doexit 54449->54454 54455 40d2e3 6 API calls __decode_pointer 54449->54455 54450->54441 54452->54449 54453->54449 54454->54449 54455->54449 54456->54341 54457->54350 54458->54345 54462 40b9aa type_info::_Type_info_dtor _strnlen 54459->54462 54460 40b9b8 54533 40bfc1 62 API calls __getptd_noexit 54460->54533 54462->54460 54465 40b9ec 54462->54465 54463 40b9bd 54534 40e744 6 API calls 2 library calls 54463->54534 54535 40d6e0 62 API calls 2 library calls 54465->54535 54467 40b9f3 54536 40b917 103 API calls 3 library calls 54467->54536 54469 40b9cd type_info::_Type_info_dtor 54469->54360 54470 40b9ff 54537 40ba18 LeaveCriticalSection _doexit 54470->54537 54473 4017cc _realloc 54472->54473 54473->54364 54475 40b900 54474->54475 54484 40b85f 54474->54484 54545 40d2e3 6 API calls __decode_pointer 54475->54545 54477 40b906 54546 40bfc1 62 API calls __getptd_noexit 54477->54546 54482 40b8bc RtlAllocateHeap 54482->54484 54483 40b870 54483->54484 54538 40ec4d 62 API calls 2 library calls 54483->54538 54539 40eaa2 62 API calls 7 library calls 54483->54539 54540 40e7ee GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 54483->54540 54484->54482 54484->54483 54486 40b8ec 54484->54486 54489 40b8f1 54484->54489 54491 401ebf 54484->54491 54541 40b7fe 62 API calls 4 library calls 54484->54541 54542 40d2e3 6 API calls __decode_pointer 54484->54542 54543 40bfc1 62 API calls __getptd_noexit 54486->54543 54544 40bfc1 62 API calls __getptd_noexit 54489->54544 54492 40af66 54491->54492 54494 40af70 54492->54494 54493 40b84d _malloc 62 API calls 54493->54494 54494->54493 54495 40af8a 54494->54495 54497 40af8c std::bad_alloc::bad_alloc 54494->54497 54547 40d2e3 6 API calls __decode_pointer 54494->54547 54495->54369 54502 40afb2 54497->54502 54548 40d2bd 73 API calls __cinit 54497->54548 54499 40afbc 54550 40cd39 RaiseException 54499->54550 54549 40af49 62 API calls std::exception::exception 54502->54549 54503 40afca 54505 401903 lstrlenA 54504->54505 54506 4018fc 54504->54506 54551 4017e0 54505->54551 54506->54392 54509 401940 GetLastError 54511 40194b MultiByteToWideChar 54509->54511 54512 40198d 54509->54512 54510 401996 54510->54392 54513 4017e0 72 API calls 54511->54513 54512->54510 54559 401030 GetLastError 54512->54559 54514 401970 MultiByteToWideChar 54513->54514 54514->54512 54517 40af66 74 API calls 54516->54517 54518 40187c 54517->54518 54519 401885 SysAllocString 54518->54519 54520 4018a4 54518->54520 54519->54520 54520->54394 54522 40231a SafeArrayUnaccessData 54521->54522 54522->54401 54524 4019aa InterlockedDecrement 54523->54524 54529 4019df VariantClear 54523->54529 54525 4019b8 54524->54525 54524->54529 54526 4019c2 SysFreeString 54525->54526 54527 4019c9 54525->54527 54525->54529 54526->54527 54563 40aec0 63 API calls 2 library calls 54527->54563 54529->54408 54530->54372 54531->54375 54532->54391 54533->54463 54535->54467 54536->54470 54537->54469 54538->54483 54539->54483 54541->54484 54542->54484 54543->54489 54544->54491 54545->54477 54546->54491 54547->54494 54548->54502 54549->54499 54550->54503 54552 4017e9 54551->54552 54557 401844 54552->54557 54558 40182d 54552->54558 54560 40b783 72 API calls 4 library calls 54552->54560 54556 40186d MultiByteToWideChar 54556->54509 54556->54510 54557->54556 54562 40b743 62 API calls 2 library calls 54557->54562 54558->54557 54561 40b6b5 62 API calls 2 library calls 54558->54561 54560->54558 54561->54557 54562->54557 54563->54529 54742 22e4bd0 54743 22e4be2 54742->54743 54744 22e4bee 54743->54744 54751 22e4ce2 54743->54751 54756 22e439c 54744->54756 54746 22e4c0d 54760 2918c68 54746->54760 54764 2918c59 54746->54764 54752 22e4d05 54751->54752 54768 22e4de0 54752->54768 54772 22e4df0 54752->54772 54757 22e43a7 54756->54757 54780 22e611c 54757->54780 54759 22e7530 54759->54746 54761 2918c7a 54760->54761 54792 2918854 54761->54792 54765 2918c7a 54764->54765 54766 2918854 7 API calls 54765->54766 54767 22e4c16 54766->54767 54770 22e4e17 54768->54770 54769 22e4ef4 54769->54769 54770->54769 54776 22e4998 54770->54776 54773 22e4e17 54772->54773 54774 22e4998 CreateActCtxA 54773->54774 54775 22e4ef4 54773->54775 54774->54775 54777 22e5e80 CreateActCtxA 54776->54777 54779 22e5f43 54777->54779 54781 22e6127 54780->54781 54784 22e613c 54781->54784 54783 22e75d5 54783->54759 54785 22e6147 54784->54785 54788 22e616c 54785->54788 54787 22e76ba 54787->54783 54789 22e6177 54788->54789 54790 22e619c 8 API calls 54789->54790 54791 22e77ad 54790->54791 54791->54787 54793 291885f 54792->54793 54796 2918894 54793->54796 54795 2918dac 54795->54795 54797 291889f 54796->54797 54800 2918ebe 54797->54800 54801 2919019 54797->54801 54802 2918adc 54797->54802 54798 2918adc 7 API calls 54798->54801 54800->54798 54800->54801 54801->54795 54803 2918ae7 54802->54803 54807 2919257 54803->54807 54818 2919268 54803->54818 54804 2919254 54804->54800 54810 291928e 54807->54810 54808 29192a2 54808->54804 54809 291937f 54816 22ee534 3 API calls 54809->54816 54817 22ee330 7 API calls 54809->54817 54810->54808 54810->54809 54813 29193e2 54810->54813 54811 291938d 54812 2918c00 PostMessageW 54811->54812 54814 29193dd 54811->54814 54812->54814 54813->54814 54815 29131d4 2 API calls 54813->54815 54814->54804 54815->54814 54816->54811 54817->54811 54821 291928e 54818->54821 54819 29192a2 54819->54804 54820 291937f 54827 22ee534 3 API calls 54820->54827 54828 22ee330 7 API calls 54820->54828 54821->54819 54821->54820 54823 29193e2 54821->54823 54822 291938d 54824 2918c00 PostMessageW 54822->54824 54825 29193dd 54822->54825 54823->54825 54826 29131d4 2 API calls 54823->54826 54824->54825 54825->54804 54826->54825 54827->54822 54828->54822

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 0 4019f0-401ac7 OleInitialize call 401650 call 40b99e 5 40248a-402496 0->5 6 401acd-401c4f GetCurrentProcessId CreateToolhelp32Snapshot Module32First 0->6 7 401dc3-401ed4 CloseHandle GetModuleHandleA call 401650 FindResourceA LoadResource LockResource SizeofResource call 40b84d call 40af66 6->7 8 401c55-401c6c call 401650 6->8 26 401ed6-401eed call 40ba30 7->26 27 401eef 7->27 14 401c73-401c77 8->14 16 401c93-401c95 14->16 17 401c79-401c7b 14->17 21 401c98-401c9a 16->21 19 401c7d-401c83 17->19 20 401c8f-401c91 17->20 19->16 23 401c85-401c8d 19->23 20->21 24 401cb0-401cce call 401650 21->24 25 401c9c-401caf CloseHandle 21->25 23->14 23->20 34 401cd0-401cd4 24->34 30 401ef3-401f1a call 401300 SizeofResource 26->30 27->30 41 401f1c-401f2f 30->41 42 401f5f-401f69 30->42 35 401cf0-401cf2 34->35 36 401cd6-401cd8 34->36 40 401cf5-401cf7 35->40 38 401cda-401ce0 36->38 39 401cec-401cee 36->39 38->35 45 401ce2-401cea 38->45 39->40 40->25 46 401cf9-401d09 Module32Next 40->46 47 401f33-401f5d call 401560 41->47 43 401f73-401f75 42->43 44 401f6b-401f72 42->44 48 401f92-4021a4 call 40ba30 FreeResource call 40b84d SizeofResource call 40ac60 call 40ba30 call 401650 LoadLibraryA call 401650 GetProcAddress 43->48 49 401f77-401f8d call 401560 43->49 44->43 45->34 45->39 46->7 50 401d0f 46->50 47->42 48->5 85 4021aa-4021c0 48->85 49->48 54 401d10-401d2e call 401650 50->54 61 401d30-401d34 54->61 63 401d50-401d52 61->63 64 401d36-401d38 61->64 65 401d55-401d57 63->65 67 401d3a-401d40 64->67 68 401d4c-401d4e 64->68 65->25 69 401d5d-401d7b call 401650 65->69 67->63 71 401d42-401d4a 67->71 68->65 76 401d80-401d84 69->76 71->61 71->68 78 401da0-401da2 76->78 79 401d86-401d88 76->79 84 401da5-401da7 78->84 82 401d8a-401d90 79->82 83 401d9c-401d9e 79->83 82->78 86 401d92-401d9a 82->86 83->84 84->25 87 401dad-401dbd Module32Next 84->87 89 4021c6-4021ca 85->89 90 40246a-402470 85->90 86->76 86->83 87->7 87->54 89->90 91 4021d0-402217 call 4018f0 89->91 92 402472-402475 90->92 93 40247a-402480 90->93 98 40221d-40223d 91->98 99 40244f-40245f 91->99 92->93 93->5 95 402482-402487 93->95 95->5 98->99 104 402243-402251 98->104 99->90 100 402461-402467 call 40b6b5 99->100 100->90 104->99 106 402257-4022b7 call 401870 VariantInit call 401870 VariantInit call 4018d0 104->106 114 4022c3-40232a call 4018d0 SafeArrayCreate SafeArrayAccessData call 40b350 SafeArrayUnaccessData 106->114 115 4022b9-4022be call 40ad90 106->115 122 402336-40234d call 4018d0 114->122 123 40232c-402331 call 40ad90 114->123 115->114 154 40234e call 76d01c 122->154 155 40234e call 76d01d 122->155 123->122 127 402350-402352 128 402354-402355 SafeArrayDestroy 127->128 129 40235b-402361 127->129 128->129 130 402363-402368 call 40ad90 129->130 131 40236d-402375 129->131 130->131 133 402377-402379 131->133 134 40237b 131->134 135 40237d-40238f call 4018d0 133->135 134->135 152 402390 call 76d01c 135->152 153 402390 call 76d01d 135->153 138 402392-4023a2 SafeArrayCreateVector 139 4023a4-4023a9 call 40ad90 138->139 140 4023ae-4023b4 138->140 139->140 142 4023b6-4023b8 140->142 143 4023ba 140->143 144 4023bc-402417 VariantClear * 2 call 4019a0 142->144 143->144 146 40241c-40242c VariantClear 144->146 147 402436-402445 call 4019a0 146->147 148 40242e-402433 146->148 147->99 151 402447-40244c 147->151 148->147 151->99 152->138 153->138 154->127 155->127
          APIs
          • OleInitialize.OLE32(00000000), ref: 004019FD
          • _getenv.LIBCMT ref: 00401ABA
          • GetCurrentProcessId.KERNEL32 ref: 00401ACD
          • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 00401AD6
          • Module32First.KERNEL32 ref: 00401C48
          • CloseHandle.KERNEL32(00000000,?,?,00000008,00000000), ref: 00401C9D
          • Module32Next.KERNEL32(00000000,?), ref: 00401D02
          • Module32Next.KERNEL32(00000000,?), ref: 00401DB6
          • CloseHandle.KERNELBASE(00000000), ref: 00401DC4
          • GetModuleHandleA.KERNEL32(00000000), ref: 00401DCB
          • FindResourceA.KERNEL32(00000000,00000000,00000008), ref: 00401E90
          • LoadResource.KERNEL32(00000000,00000000), ref: 00401E9E
          • LockResource.KERNEL32(00000000), ref: 00401EA7
          • SizeofResource.KERNEL32(00000000,00000000), ref: 00401EB3
          • _malloc.LIBCMT ref: 00401EBA
          • _memset.LIBCMT ref: 00401EDD
          • SizeofResource.KERNEL32(00000000,?), ref: 00401F02
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: Resource$HandleModule32$CloseNextSizeof$CreateCurrentFindFirstInitializeLoadLockModuleProcessSnapshotToolhelp32_getenv_malloc_memset
          • String ID: !$!$!$"$%$'$'$)$*$*$.$.$0$4$4$4$5$6$8$:$D$E$U$V$V$W$W$W$W$[$[$_._$___$h$o$o$o$v$v$v$v$x$x$x$x${${${${
          • API String ID: 1430744539-2962942730
          • Opcode ID: 224088bd6fdf40f00aacdd5f7db7c03047c3cc993abb63ba2c7175de51848a6e
          • Instruction ID: 7b7814addfdf4b3cbdaef5ede101091f5fb3e94df766619d88950efa0d528cfd
          • Opcode Fuzzy Hash: 224088bd6fdf40f00aacdd5f7db7c03047c3cc993abb63ba2c7175de51848a6e
          • Instruction Fuzzy Hash: B3628C2100C7C19EC321DB388888A5FBFE55FA6328F484A5DF1E55B2E2C7799509C76B
          Memory Dump Source
          • Source File: 00000000.00000002.1510866762.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_69e0000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 048dabc711bfacf2bdfccc9ba1538021bcdccf0a3cb8097c044955a77ab97971
          • Instruction ID: b2cf4d11d85b41c7a0bfd7b79e302a536a34e2069ce2601484e3b91ea04ab987
          • Opcode Fuzzy Hash: 048dabc711bfacf2bdfccc9ba1538021bcdccf0a3cb8097c044955a77ab97971
          • Instruction Fuzzy Hash: 54A102B4D00218CFEB54DFA9C8487ADBBF6BF89300F209569D409A7291DB799A85CF50

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 156 4018f0-4018fa 157 401903-40193e lstrlenA call 4017e0 MultiByteToWideChar 156->157 158 4018fc-401900 156->158 161 401940-401949 GetLastError 157->161 162 401996-40199a 157->162 163 40194b-40198c MultiByteToWideChar call 4017e0 MultiByteToWideChar 161->163 164 40198d-40198f 161->164 163->164 164->162 166 401991 call 401030 164->166 166->162
          APIs
          • lstrlenA.KERNEL32(?), ref: 00401906
          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000001), ref: 0040192F
          • GetLastError.KERNEL32 ref: 00401940
          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401958
          • MultiByteToWideChar.KERNEL32(?,00000000,?,00000001,00000000,00000000), ref: 00401980
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: ByteCharMultiWide$ErrorLastlstrlen
          • String ID:
          • API String ID: 3322701435-0
          • Opcode ID: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
          • Instruction ID: 001f8acd6346668203df0e37acbb0982e2c141f20d3592a2a78c171e7710dcce
          • Opcode Fuzzy Hash: dc08e0b6a0031b3e1018e6655837127b4a51d66f486618f8dc54bc0ca8c4194d
          • Instruction Fuzzy Hash: 4011C4756003247BD3309B15CC88F677F6CEB86BA9F008169FD85AB291C635AC04C6F8

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 169 22ed5f0-22ed68f GetCurrentProcess 173 22ed698-22ed6cc GetCurrentThread 169->173 174 22ed691-22ed697 169->174 175 22ed6ce-22ed6d4 173->175 176 22ed6d5-22ed709 GetCurrentProcess 173->176 174->173 175->176 178 22ed70b-22ed711 176->178 179 22ed712-22ed72d call 22ed7d1 176->179 178->179 181 22ed733-22ed762 GetCurrentThreadId 179->181 183 22ed76b-22ed7cd 181->183 184 22ed764-22ed76a 181->184 184->183
          APIs
          • GetCurrentProcess.KERNEL32 ref: 022ED67E
          • GetCurrentThread.KERNEL32 ref: 022ED6BB
          • GetCurrentProcess.KERNEL32 ref: 022ED6F8
          • GetCurrentThreadId.KERNEL32 ref: 022ED751
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: bafd65c14440de1b572f00573a6037224863b9fac02cd8b3cd9e85ddc2daeeb7
          • Instruction ID: edd99ca86f753a94c855f51e4537012c3766990a76ef975c8684b79bb605f9e0
          • Opcode Fuzzy Hash: bafd65c14440de1b572f00573a6037224863b9fac02cd8b3cd9e85ddc2daeeb7
          • Instruction Fuzzy Hash: 5D5154B0D0034A8FDB14DFAAD649BEEBBF1EB88314F208459E419A72A0DB745845CF65

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 191 22ed600-22ed68f GetCurrentProcess 195 22ed698-22ed6cc GetCurrentThread 191->195 196 22ed691-22ed697 191->196 197 22ed6ce-22ed6d4 195->197 198 22ed6d5-22ed709 GetCurrentProcess 195->198 196->195 197->198 200 22ed70b-22ed711 198->200 201 22ed712-22ed72d call 22ed7d1 198->201 200->201 203 22ed733-22ed762 GetCurrentThreadId 201->203 205 22ed76b-22ed7cd 203->205 206 22ed764-22ed76a 203->206 206->205
          APIs
          • GetCurrentProcess.KERNEL32 ref: 022ED67E
          • GetCurrentThread.KERNEL32 ref: 022ED6BB
          • GetCurrentProcess.KERNEL32 ref: 022ED6F8
          • GetCurrentThreadId.KERNEL32 ref: 022ED751
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: Current$ProcessThread
          • String ID:
          • API String ID: 2063062207-0
          • Opcode ID: 01cf2fd6b8355ecff6640c30261f3fa60f7ed46a9f4296b6cc1c765725f7dc47
          • Instruction ID: 9a64659e4a019e6975c901a21d08ab376b3bd3cadd8cb17184f63e3c2073493e
          • Opcode Fuzzy Hash: 01cf2fd6b8355ecff6640c30261f3fa60f7ed46a9f4296b6cc1c765725f7dc47
          • Instruction Fuzzy Hash: 4F5175B0D0030A8FDB14DFAAD648BDEBBF1EB88314F208459E419A73A0DB345845CF69

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 213 40af66-40af6e 214 40af7d-40af88 call 40b84d 213->214 217 40af70-40af7b call 40d2e3 214->217 218 40af8a-40af8b 214->218 217->214 221 40af8c-40af98 217->221 222 40afb3-40afca call 40af49 call 40cd39 221->222 223 40af9a-40afb2 call 40aefc call 40d2bd 221->223 223->222
          APIs
          • _malloc.LIBCMT ref: 0040AF80
            • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
            • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
            • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
          • std::bad_alloc::bad_alloc.LIBCMT ref: 0040AFA3
            • Part of subcall function 0040AEFC: std::exception::exception.LIBCMT ref: 0040AF08
          • std::bad_exception::bad_exception.LIBCMT ref: 0040AFB7
          • __CxxThrowException@8.LIBCMT ref: 0040AFC5
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: AllocateException@8HeapThrow_mallocstd::bad_alloc::bad_allocstd::bad_exception::bad_exceptionstd::exception::exception
          • String ID:
          • API String ID: 1411284514-0
          • Opcode ID: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
          • Instruction ID: 8b9ae61c6da4be1dff3a05d3864a1109474d1d20ea1a05e38be312cad591667e
          • Opcode Fuzzy Hash: 248d97f5b0d58b32bb2c6dfd0cee56c1e8c558e55d5e2921fa5105a46d33be9f
          • Instruction Fuzzy Hash: 67F0BE21A0030662CA15BB61EC06D8E3B688F4031CB6000BFE811761D2CFBCEA55859E

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2287 27b1d30-27b1e3d 2288 27b1e3f-27b1e70 call 27b12d0 2287->2288 2289 27b1e92-27b1ef6 2287->2289 2295 27b1e75-27b1e76 2288->2295 2291 27b1ef8-27b1efe 2289->2291 2292 27b1f01-27b1f08 2289->2292 2291->2292 2293 27b1f0a-27b1f10 2292->2293 2294 27b1f13-27b1fb2 CreateWindowExW 2292->2294 2293->2294 2297 27b1fbb-27b1ff3 2294->2297 2298 27b1fb4-27b1fba 2294->2298 2302 27b2000 2297->2302 2303 27b1ff5-27b1ff8 2297->2303 2298->2297 2304 27b2001 2302->2304 2303->2302 2304->2304
          APIs
          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 027B1FA2
          Memory Dump Source
          • Source File: 00000000.00000002.1507485968.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_27b0000_loader.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID:
          • API String ID: 716092398-0
          • Opcode ID: e3e193a90f4b2d8886b05d845024b72f137f0b54798179b07c897378d772690a
          • Instruction ID: c289683cf454d85b3c1164ada5010651443cd0f64e096c4f6e9a3472faeee00e
          • Opcode Fuzzy Hash: e3e193a90f4b2d8886b05d845024b72f137f0b54798179b07c897378d772690a
          • Instruction Fuzzy Hash: 56916E7180D3C89FCB03CFA5C8A0ADDBFB1AF4A214F1981DAE884AB163D7355915CB51

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2305 22eb358-22eb377 2306 22eb379-22eb386 call 22eacfc 2305->2306 2307 22eb3a3-22eb3a7 2305->2307 2314 22eb39c 2306->2314 2315 22eb388 2306->2315 2308 22eb3bb-22eb3fc 2307->2308 2309 22eb3a9-22eb3b3 2307->2309 2316 22eb3fe-22eb406 2308->2316 2317 22eb409-22eb417 2308->2317 2309->2308 2314->2307 2360 22eb38e call 22eb600 2315->2360 2361 22eb38e call 22eb5f0 2315->2361 2316->2317 2318 22eb43b-22eb43d 2317->2318 2319 22eb419-22eb41e 2317->2319 2322 22eb440-22eb447 2318->2322 2323 22eb429 2319->2323 2324 22eb420-22eb427 call 22ead08 2319->2324 2320 22eb394-22eb396 2320->2314 2321 22eb4d8-22eb598 2320->2321 2355 22eb59a-22eb59d 2321->2355 2356 22eb5a0-22eb5cb GetModuleHandleW 2321->2356 2326 22eb449-22eb451 2322->2326 2327 22eb454-22eb45b 2322->2327 2325 22eb42b-22eb439 2323->2325 2324->2325 2325->2322 2326->2327 2329 22eb45d-22eb465 2327->2329 2330 22eb468-22eb471 call 22ead18 2327->2330 2329->2330 2336 22eb47e-22eb483 2330->2336 2337 22eb473-22eb47b 2330->2337 2338 22eb485-22eb48c 2336->2338 2339 22eb4a1-22eb4ae 2336->2339 2337->2336 2338->2339 2341 22eb48e-22eb49e call 22ead28 call 22ead38 2338->2341 2345 22eb4b0-22eb4ce 2339->2345 2346 22eb4d1-22eb4d7 2339->2346 2341->2339 2345->2346 2355->2356 2357 22eb5cd-22eb5d3 2356->2357 2358 22eb5d4-22eb5e8 2356->2358 2357->2358 2360->2320 2361->2320
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 022EB5BE
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 958d327a1eb28822ed5530c86aeeb3387083d3887045dfb28e627842b228688d
          • Instruction ID: 2d2e71b30191603065ad7438052a424d7c7c1c71a4e8a58620e51dc649625290
          • Opcode Fuzzy Hash: 958d327a1eb28822ed5530c86aeeb3387083d3887045dfb28e627842b228688d
          • Instruction Fuzzy Hash: 78814770A10B058FDB24DF69D45179ABBF1FF88304F408A2DD48AD7A54D774E85ACB90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2362 27b1e85-27b1ef6 2363 27b1ef8-27b1efe 2362->2363 2364 27b1f01-27b1f08 2362->2364 2363->2364 2365 27b1f0a-27b1f10 2364->2365 2366 27b1f13-27b1f4b 2364->2366 2365->2366 2367 27b1f53-27b1fb2 CreateWindowExW 2366->2367 2368 27b1fbb-27b1ff3 2367->2368 2369 27b1fb4-27b1fba 2367->2369 2373 27b2000 2368->2373 2374 27b1ff5-27b1ff8 2368->2374 2369->2368 2375 27b2001 2373->2375 2374->2373 2375->2375
          APIs
          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 027B1FA2
          Memory Dump Source
          • Source File: 00000000.00000002.1507485968.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_27b0000_loader.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID:
          • API String ID: 716092398-0
          • Opcode ID: 90157a513a54b890a6a18cf94688f47b30288420f5720ad581a5b8335288212a
          • Instruction ID: 9b4a402d8467c873f352345830d330d4c07f6fb657999356a5d193bc0ecc7d45
          • Opcode Fuzzy Hash: 90157a513a54b890a6a18cf94688f47b30288420f5720ad581a5b8335288212a
          • Instruction Fuzzy Hash: 7451CCB1D013499FDB15CFAAC994ADEBBB5FF89310F64812AE819AB210D7709845CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2376 27b1e90-27b1ef6 2377 27b1ef8-27b1efe 2376->2377 2378 27b1f01-27b1f08 2376->2378 2377->2378 2379 27b1f0a-27b1f10 2378->2379 2380 27b1f13-27b1f4b 2378->2380 2379->2380 2381 27b1f53-27b1fb2 CreateWindowExW 2380->2381 2382 27b1fbb-27b1ff3 2381->2382 2383 27b1fb4-27b1fba 2381->2383 2387 27b2000 2382->2387 2388 27b1ff5-27b1ff8 2382->2388 2383->2382 2389 27b2001 2387->2389 2388->2387 2389->2389
          APIs
          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 027B1FA2
          Memory Dump Source
          • Source File: 00000000.00000002.1507485968.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_27b0000_loader.jbxd
          Similarity
          • API ID: CreateWindow
          • String ID:
          • API String ID: 716092398-0
          • Opcode ID: 6a53fc2074891adfee438a82624533225fa62c87685403608434ab5d5dbdfdef
          • Instruction ID: 89031e3bc3aea2a9cccf58a94e21b9bd8d9b5fafbabfd181c8e5f19ec21709f9
          • Opcode Fuzzy Hash: 6a53fc2074891adfee438a82624533225fa62c87685403608434ab5d5dbdfdef
          • Instruction Fuzzy Hash: 1941DDB1D003089FDB15CF9AC894ADEBBB5FF88314F64812AE819AB210D774A841CF90

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2406 27b1424-27b449c 2409 27b454c-27b456c call 27b12fc 2406->2409 2410 27b44a2-27b44a7 2406->2410 2418 27b456f-27b457c 2409->2418 2412 27b44fa-27b4532 CallWindowProcW 2410->2412 2413 27b44a9-27b44e0 2410->2413 2416 27b453b-27b454a 2412->2416 2417 27b4534-27b453a 2412->2417 2421 27b44e9-27b44f8 2413->2421 2422 27b44e2-27b44e8 2413->2422 2416->2418 2417->2416 2421->2418 2422->2421
          APIs
          • CallWindowProcW.USER32(?,?,?,?,?), ref: 027B4521
          Memory Dump Source
          • Source File: 00000000.00000002.1507485968.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_27b0000_loader.jbxd
          Similarity
          • API ID: CallProcWindow
          • String ID:
          • API String ID: 2714655100-0
          • Opcode ID: 12d0b08aca764ea682134c8520f5827706ebbb7f117f11c53f8b95be6e1fb579
          • Instruction ID: 477469ec3567e6599841fd5a229e96ca4cf5e1012a3a39d6a2b21b0849498835
          • Opcode Fuzzy Hash: 12d0b08aca764ea682134c8520f5827706ebbb7f117f11c53f8b95be6e1fb579
          • Instruction Fuzzy Hash: 164149B9A003099FCB15CF89C458BAABBF5FF88314F24C499D519AB321D734A845CFA4

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2390 22e5e75-22e5f41 CreateActCtxA 2392 22e5f4a-22e5fa4 2390->2392 2393 22e5f43-22e5f49 2390->2393 2400 22e5fa6-22e5fa9 2392->2400 2401 22e5fb3-22e5fb7 2392->2401 2393->2392 2400->2401 2402 22e5fc8 2401->2402 2403 22e5fb9-22e5fc5 2401->2403 2405 22e5fc9 2402->2405 2403->2402 2405->2405
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 022E5F31
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: 2cece6db1e7bf3ec95048d922c7b80590060855f880374579619b375f79b4f1a
          • Instruction ID: d5c0369fc6bc1f0b4192709cd4eb372963d959a84b6fe6bbae90008ae20c69b2
          • Opcode Fuzzy Hash: 2cece6db1e7bf3ec95048d922c7b80590060855f880374579619b375f79b4f1a
          • Instruction Fuzzy Hash: FC41F0B0C10719CBEB24CFA9C844BDEBBB5BF49304F60816AE409AB254DB756946CF51

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2424 22e4998-22e5f41 CreateActCtxA 2427 22e5f4a-22e5fa4 2424->2427 2428 22e5f43-22e5f49 2424->2428 2435 22e5fa6-22e5fa9 2427->2435 2436 22e5fb3-22e5fb7 2427->2436 2428->2427 2435->2436 2437 22e5fc8 2436->2437 2438 22e5fb9-22e5fc5 2436->2438 2440 22e5fc9 2437->2440 2438->2437 2440->2440
          APIs
          • CreateActCtxA.KERNEL32(?), ref: 022E5F31
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: Create
          • String ID:
          • API String ID: 2289755597-0
          • Opcode ID: cbc179c8504a28b8cf295620f614ee9c90c0b713ec7f845872b39d174b2a48bb
          • Instruction ID: e122e220d171c7ff43c2135ab02614973fe5bd986d17740018811d136c7532cd
          • Opcode Fuzzy Hash: cbc179c8504a28b8cf295620f614ee9c90c0b713ec7f845872b39d174b2a48bb
          • Instruction Fuzzy Hash: F14102B0C10719CBEB24DFA9C844B9EBBF1BF49304F60816AE409AB254DB756946CF91

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2441 2913204-291de9c 2444 291dea2-291df52 SendMessageW 2441->2444 2445 291de9e-291dea1 2441->2445 2451 291df54-291df5a 2444->2451 2452 291df5b-291df6f 2444->2452 2451->2452
          APIs
          • SendMessageW.USER32(?,?,?,?), ref: 0291DF45
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID: MessageSend
          • String ID:
          • API String ID: 3850602802-0
          • Opcode ID: 3d61801dac8e316ddecf8f792c28f18812db48dadd19d21fa80ff142e0e9d0ea
          • Instruction ID: 9300958dbb359e5cda4b936f21b1fb15524e5d3e988f14b6a82726be83e20464
          • Opcode Fuzzy Hash: 3d61801dac8e316ddecf8f792c28f18812db48dadd19d21fa80ff142e0e9d0ea
          • Instruction Fuzzy Hash: 53316DB1A00348DFDB24DFAAD484B9EBFF8EB89310F108459E419A7350C775A944CFA5

          Control-flow Graph

          • Executed
          • Not Executed
          control_flow_graph 2454 22ed840-22ed8dc DuplicateHandle 2455 22ed8de-22ed8e4 2454->2455 2456 22ed8e5-22ed902 2454->2456 2455->2456
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022ED8CF
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 18478543d1142c3865f2f954a21698e9488a06dd1b309b07606adc68ece6a5b6
          • Instruction ID: d386f20663552d372b94ceb2fc686ca44c88244118e9135338ba169782767bf8
          • Opcode Fuzzy Hash: 18478543d1142c3865f2f954a21698e9488a06dd1b309b07606adc68ece6a5b6
          • Instruction Fuzzy Hash: 8F2103B5D00248AFDB10CFAAD984AEEBBF8EF48310F14805AE955A3350D374A951CFA0
          APIs
          • GetClassInfoW.USER32(?,00000000), ref: 0291E9CC
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID: ClassInfo
          • String ID:
          • API String ID: 3534257612-0
          • Opcode ID: f49ce18228aee565f8c5771f44540ea34716c50a0477b7af69080ca53a1c5b06
          • Instruction ID: 3ecd7384c01cc3f713f99c03629cc7a45df52b2d8fbe739482f03457083e722f
          • Opcode Fuzzy Hash: f49ce18228aee565f8c5771f44540ea34716c50a0477b7af69080ca53a1c5b06
          • Instruction Fuzzy Hash: 272114B6D016499FDB10DF9AD884BDEFBF8BF48214F14802AE859A3240D338A904CB64
          APIs
          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 022ED8CF
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: DuplicateHandle
          • String ID:
          • API String ID: 3793708945-0
          • Opcode ID: 3dc5ad37360f314ac8094d548ae3a2e2a049ff02218826e3e4d437d9bd2d231f
          • Instruction ID: 9b1d5bcac58bcb7eecb69f06017949c13e31fc7f48058f6a8d7acbf396edeadd
          • Opcode Fuzzy Hash: 3dc5ad37360f314ac8094d548ae3a2e2a049ff02218826e3e4d437d9bd2d231f
          • Instruction Fuzzy Hash: 7021E4B5D002499FDB10CFAAD984ADEBBF8EB48310F54801AE915A3350D374A941CFA0
          APIs
          • GetClassInfoW.USER32(?,00000000), ref: 0291E9CC
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID: ClassInfo
          • String ID:
          • API String ID: 3534257612-0
          • Opcode ID: e008f7c0a42fe8510a15bbef9097ce677bb05f794e01aa527d87fa48dcb781fe
          • Instruction ID: 19c8cb8c70e51cbaaa895905e015ca74d6462a3a7bd387860289e1e0ef7f8069
          • Opcode Fuzzy Hash: e008f7c0a42fe8510a15bbef9097ce677bb05f794e01aa527d87fa48dcb781fe
          • Instruction Fuzzy Hash: 322113B5D017098FDB10DF9AD984BDEFBF8FB48324F14842AE859A3240D378A904CB65
          APIs
          • SetWindowTextW.USER32(?,00000000), ref: 0291B0D2
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID: TextWindow
          • String ID:
          • API String ID: 530164218-0
          • Opcode ID: d1bfe9120e559d2be6071778e068b1b325e02d325062d03456f06445e8d102a4
          • Instruction ID: d9c778aa6545a9a75c553ea9dfa6529615fb87a43e2f5b9ae8859623b92d67c2
          • Opcode Fuzzy Hash: d1bfe9120e559d2be6071778e068b1b325e02d325062d03456f06445e8d102a4
          • Instruction Fuzzy Hash: CB2136B6D002498FDB24CF9AD545BEEFBF5EB88324F14C02AD468A3240C739A545CFA1
          APIs
          • SetWindowTextW.USER32(?,00000000), ref: 0291B0D2
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID: TextWindow
          • String ID:
          • API String ID: 530164218-0
          • Opcode ID: 452fbcd480e30c1647e4d16a91bbdf17b837ccb50954ddfda4de53c253ee6faa
          • Instruction ID: efd9f8aeec69390b03153c1c0a8d2d1f23a23a28ce4d7bfefd60402f49b1b24e
          • Opcode Fuzzy Hash: 452fbcd480e30c1647e4d16a91bbdf17b837ccb50954ddfda4de53c253ee6faa
          • Instruction Fuzzy Hash: 831114B6D002498FDB14CF9AC944BDEFBF5EB88324F10C02AD868A3240D739A545CFA1
          APIs
          • GetConsoleWindow.KERNELBASE ref: 069E750F
          Memory Dump Source
          • Source File: 00000000.00000002.1510866762.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_69e0000_loader.jbxd
          Similarity
          • API ID: ConsoleWindow
          • String ID:
          • API String ID: 2863861424-0
          • Opcode ID: b821106b530e060e5c9930cdf1ee7d6be9d672c422140decc8e5f43aecc1d9a4
          • Instruction ID: a6223cff369e0b169852b0ce486280746e9e40d972e3cd73453b0c19a256d7d4
          • Opcode Fuzzy Hash: b821106b530e060e5c9930cdf1ee7d6be9d672c422140decc8e5f43aecc1d9a4
          • Instruction Fuzzy Hash: FA113A71D003498FDB24DFAAD8457DEBBF5EF48324F248819D419A7640CB399941CF91
          APIs
          • PostMessageW.USER32(?,00000018,00000001,?), ref: 0291C73D
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 2d2e8e6a810f2a15aacb1a2f87021fb9029fcf0dee9ab16c1a897ccdd3672a34
          • Instruction ID: bc25f4fe9fa84aada306f3c1a9e5bb79c3831b1145532d5da071340dd45bf3ae
          • Opcode Fuzzy Hash: 2d2e8e6a810f2a15aacb1a2f87021fb9029fcf0dee9ab16c1a897ccdd3672a34
          • Instruction Fuzzy Hash: 9811F5B5800349DFDB10DF9AD945BDEBBF8EB48324F10845AD554A7210C375A945CFA1
          APIs
          • GetConsoleWindow.KERNELBASE ref: 069E750F
          Memory Dump Source
          • Source File: 00000000.00000002.1510866762.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_69e0000_loader.jbxd
          Similarity
          • API ID: ConsoleWindow
          • String ID:
          • API String ID: 2863861424-0
          • Opcode ID: 1b97f314d6b1aec5bbe7d7cd4e3a1b7892247b991af94773370d2d7049175812
          • Instruction ID: 730c86a9ec5e054e228f70d7af84f25be1dac5faa93ddd4b81323445eb92924b
          • Opcode Fuzzy Hash: 1b97f314d6b1aec5bbe7d7cd4e3a1b7892247b991af94773370d2d7049175812
          • Instruction Fuzzy Hash: FA111871D003498FDB24DFAAC8457DEFBF4EB48324F248419D419A7240DB79A945CF95
          APIs
          • GetModuleHandleW.KERNELBASE(00000000), ref: 022EB5BE
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID: HandleModule
          • String ID:
          • API String ID: 4139908857-0
          • Opcode ID: 152bac51475700ab55183e92b0fe773ab557e4111eb63a85d48499ecdc7c026d
          • Instruction ID: a0015783fecaca1e3bf4eef1b5f902a1d548118aa00ccda23307952a4a006b5d
          • Opcode Fuzzy Hash: 152bac51475700ab55183e92b0fe773ab557e4111eb63a85d48499ecdc7c026d
          • Instruction Fuzzy Hash: BE1102B5C003498FDB10DF9AD444BDEFBF4AB88314F14841AD429A7210D375A545CFA1
          APIs
          • PostMessageW.USER32(?,00000018,00000001,?), ref: 0291C73D
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID: MessagePost
          • String ID:
          • API String ID: 410705778-0
          • Opcode ID: 45158aa26e2c27673739ead920951ac28c91857b749f7d6caedcc4ef42078b00
          • Instruction ID: f44e023533825cecadd649205b3a9b246e34ed2dad32a40acf1e553476835730
          • Opcode Fuzzy Hash: 45158aa26e2c27673739ead920951ac28c91857b749f7d6caedcc4ef42078b00
          • Instruction Fuzzy Hash: FD1103B590034DDFDB20DF9AD985BDEBBF8EB48324F10845AE518A7200C375A944CFA5
          APIs
            • Part of subcall function 0040AF66: _malloc.LIBCMT ref: 0040AF80
          • SysAllocString.OLEAUT32 ref: 00401898
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: AllocString_malloc
          • String ID:
          • API String ID: 959018026-0
          • Opcode ID: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
          • Instruction ID: c2922591c351a4c461934d9b8210169c8be4224f150a02a6988c85a72df9e820
          • Opcode Fuzzy Hash: 2b2277ba2f7599175ad158743716730806d9da3e8ba5769d67c84622d6ab0768
          • Instruction Fuzzy Hash: BEF02073501322A7E3316B658841B47B6E8DF80B28F00823FFD44BB391D3B9C85082EA
          APIs
          • SetWindowLongW.USER32(?,?,?), ref: 027B2135
          Memory Dump Source
          • Source File: 00000000.00000002.1507485968.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_27b0000_loader.jbxd
          Similarity
          • API ID: LongWindow
          • String ID:
          • API String ID: 1378638983-0
          • Opcode ID: 47a005429a82f7024daa8ae832215990efe3ab6e7b5fad74b5e1e1488238310c
          • Instruction ID: 77b2e46c03316883ea0cf4c627ca18be25f436ebb42bfe13492221cf352d70dc
          • Opcode Fuzzy Hash: 47a005429a82f7024daa8ae832215990efe3ab6e7b5fad74b5e1e1488238310c
          • Instruction Fuzzy Hash: F2F0E2B59002099FDB10DF89D485BDEBBF4EF88324F20845AE969A7251C378A945CFA1
          APIs
          • HeapCreate.KERNELBASE(00000000,00001000,00000000), ref: 0040D549
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: CreateHeap
          • String ID:
          • API String ID: 10892065-0
          • Opcode ID: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
          • Instruction ID: a29dbb507fbbbc11cf477c5ad410ace9233c9b691e3651c0b65acef059567112
          • Opcode Fuzzy Hash: b92e553731a4154449cde6b8e59536b0b0aa674871376bfeaf174e1f515a675d
          • Instruction Fuzzy Hash: E8D05E36A54348AADB11AFB47C08B623BDCE388396F404576F80DC6290F678D641C548
          Memory Dump Source
          • Source File: 00000000.00000002.1505590280.000000000076D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0076D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_76d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6d33f230e359f10db701d2dc3bd9a7b0d040adafe70a80124e7d33f3fc0affa3
          • Instruction ID: e2125cef7dd6abd3b81158f5dcc78ae9f517bf18f63179d5feb2f784ac595c67
          • Opcode Fuzzy Hash: 6d33f230e359f10db701d2dc3bd9a7b0d040adafe70a80124e7d33f3fc0affa3
          • Instruction Fuzzy Hash: 132106B1A14200DFDB25DF10D9C0B16BF65FB98318F248569DC0B0B647C33ADD66CAA2
          Memory Dump Source
          • Source File: 00000000.00000002.1505665026.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 4ef7ab996fab075c6c98602037d8c21005bbe6bc9caf93032a175ffae1ebba81
          • Instruction ID: ec2964a4b7cf1eb359d7a4231fab4feed30862e5dd10dea5e673d368114fa806
          • Opcode Fuzzy Hash: 4ef7ab996fab075c6c98602037d8c21005bbe6bc9caf93032a175ffae1ebba81
          • Instruction Fuzzy Hash: CE21C1716042049FDF25DF10D980B15BBB5FF84324F24C5A9D84D4B242C33ADC47CA61
          Memory Dump Source
          • Source File: 00000000.00000002.1505665026.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: d06d4fd9397f4f9f359577b4bdc3a35eaa842d2090cd7324fa320b7b8c69288a
          • Instruction ID: 8fe8d95a44e4a4da4b0f037c9bc4f2997f4128f4ba42b4b704a0d4627b07d75f
          • Opcode Fuzzy Hash: d06d4fd9397f4f9f359577b4bdc3a35eaa842d2090cd7324fa320b7b8c69288a
          • Instruction Fuzzy Hash: 0F21CF756042049FDF24DF14D984B26BBB5EB88314F24C569D84D4B286C33ADC47CA62
          Memory Dump Source
          • Source File: 00000000.00000002.1505590280.000000000076D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0076D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_76d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f63b2946cef6f228bea6bf308b0c32d66e3d437da7a1df527002fe7e9624e2f1
          • Instruction ID: c040383d711aa549c8186ad2e3d534f68aaff787b757a008e3c6fa40c67a68af
          • Opcode Fuzzy Hash: f63b2946cef6f228bea6bf308b0c32d66e3d437da7a1df527002fe7e9624e2f1
          • Instruction Fuzzy Hash: C311B176A04280CFCB15CF10D9C4B16BF72FB98324F2485A9DC0A4B657C33AD866CBA1
          Memory Dump Source
          • Source File: 00000000.00000002.1505665026.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 04350605a9db7d138f2fbe48ca01c73726ab69fdae8acd1ee8d1c9fc5ffa3134
          • Instruction ID: 7186bf6fe5f9469e4339349d5879813dcfb46b967d8be26463dd3721dcc5cf76
          • Opcode Fuzzy Hash: 04350605a9db7d138f2fbe48ca01c73726ab69fdae8acd1ee8d1c9fc5ffa3134
          • Instruction Fuzzy Hash: 1E118E75504284DFCB15CF14D5C4B15BBB2FB44314F24C6A9D84D4B656C33AD85ACB61
          Memory Dump Source
          • Source File: 00000000.00000002.1505665026.000000000077D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0077D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_77d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 04350605a9db7d138f2fbe48ca01c73726ab69fdae8acd1ee8d1c9fc5ffa3134
          • Instruction ID: 7c919ebc49b885a445e5bf069c898ef8f0e898de04e3d5da52ae5eece6615219
          • Opcode Fuzzy Hash: 04350605a9db7d138f2fbe48ca01c73726ab69fdae8acd1ee8d1c9fc5ffa3134
          • Instruction Fuzzy Hash: 00118B75504280DFCB15DF14D6C4B15BBB2FF84324F28C6ADD8494B696C33AD84ACB61
          Memory Dump Source
          • Source File: 00000000.00000002.1505590280.000000000076D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0076D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_76d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a07728bf40f06818d61a5313922ecf025a7d287d91180f3721fb11cd7c9b61ba
          • Instruction ID: 122ffc7cb5263b3a66c9b9847a9d07ec1c5bf27ef6a6fc796eeafec20c089980
          • Opcode Fuzzy Hash: a07728bf40f06818d61a5313922ecf025a7d287d91180f3721fb11cd7c9b61ba
          • Instruction Fuzzy Hash: A701F271A183449EE7304A21CC84B66BF98DF81325F18C06AEC4A0B282C27C9C46CAB2
          Memory Dump Source
          • Source File: 00000000.00000002.1505590280.000000000076D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0076D000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_76d000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2bbbad51dd8cb9594fd7acf7ee02a7ec2517f6498879357ebc3195731bbd8483
          • Instruction ID: 2ab9fa0cb89ff850b75ba99ee89f82ebfc813a88dca5d2b7b7d5cb1c6b8f2c74
          • Opcode Fuzzy Hash: 2bbbad51dd8cb9594fd7acf7ee02a7ec2517f6498879357ebc3195731bbd8483
          • Instruction Fuzzy Hash: 0EF0F071604344AEEB208E16CC84B63FFD8EB81334F18C15AED490F286C279AC44CBB1
          APIs
          • IsDebuggerPresent.KERNEL32 ref: 004136F4
          • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00413709
          • UnhandledExceptionFilter.KERNEL32(0041FB80), ref: 00413714
          • GetCurrentProcess.KERNEL32(C0000409), ref: 00413730
          • TerminateProcess.KERNEL32(00000000), ref: 00413737
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
          • String ID:
          • API String ID: 2579439406-0
          • Opcode ID: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
          • Instruction ID: 93bf0ba95bc2a0faef8203f21c221f33afe887fd41373e09ae0fa508b254143b
          • Opcode Fuzzy Hash: 8d1f5aed7c5dfd20079dd4d946f02ab3c4db913f1b194ab0176bc05653236347
          • Instruction Fuzzy Hash: A521C3B4601204EFD720DF65E94A6457FB4FB08356F80407AE50887772E7B86682CF4D
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID: @$@$PA
          • API String ID: 0-3039612711
          • Opcode ID: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
          • Instruction ID: 284407f43597d2b1529aa5dbb826e4f49811f0ea4eaa41d9cabafce47d44ff82
          • Opcode Fuzzy Hash: 524773d1bc2011db47f0014430bcd25baf081f96639b8f8b2c6f9a821cea509b
          • Instruction Fuzzy Hash: 64E159316083418FC724DF28C58066BB7E1AFD9314F14493EE8C5A7391EB79D949CB8A
          APIs
          • GetProcessHeap.KERNEL32 ref: 0040ADD0
          • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 0040ADE1
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: Heap$FreeProcess
          • String ID:
          • API String ID: 3859560861-0
          • Opcode ID: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
          • Instruction ID: 72dd180cd7110ee49b406fd12918c6a771032a3efea8c67e715e4993f3fed615
          • Opcode Fuzzy Hash: 97be969a41baf58eb72298c462d2c401217e5b830f10c891868ac5f2a1a85b43
          • Instruction Fuzzy Hash: 54E09A312003009FC320AB61DC08FA337AAEF88311F04C829E55A936A0DB78EC42CB58
          APIs
          • SetUnhandledExceptionFilter.KERNEL32(Function_000123AF), ref: 004123F6
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: ExceptionFilterUnhandled
          • String ID:
          • API String ID: 3192549508-0
          • Opcode ID: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
          • Instruction ID: 17be93bd3878235df00445469c4c747c8dbd7a907b9f456768254b9c32cbcc1b
          • Opcode Fuzzy Hash: 4924e8eeaf860e2c76ee0bfea96ab0c911441afc8f12962253436aa9ca0899ee
          • Instruction Fuzzy Hash: CA900270661144D7865017705D0968669949B4C6427618471653DD4098DBAA40505569
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
          • Instruction ID: d5e3495c9826dce769b252ea72d1bcaf7b5d46a24141b332915225fd3cdae7ad
          • Opcode Fuzzy Hash: 8976f0a61fc1960936828f21bd26f3318fd330ab7a4f50ce487ee3b945538f04
          • Instruction Fuzzy Hash: 9852A471A047129FC708CF29C99066AB7E1FF88304F044A3EE896E7B81D739E955CB95
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 38776f4f640d1c4cdfdccd3ed4ed7c2166a1eaa8f865203e2d05c9c81e6398fc
          • Instruction ID: f028f75df1cc95a162c610ae342cf76e37780dd17b825fa07af38f814f924ced
          • Opcode Fuzzy Hash: 38776f4f640d1c4cdfdccd3ed4ed7c2166a1eaa8f865203e2d05c9c81e6398fc
          • Instruction Fuzzy Hash: 1A426D70E00218CFDB68DF69C89479EBBF6AF88300F148569D40AAB395DB349D45CFA5
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
          • Instruction ID: 17d22deff8d32e931318445bbea846c6b698fa6fcc44f6923348d96d7e24b863
          • Opcode Fuzzy Hash: 20055dc05f39624d89f9d13173d00032c9ddb5f23ed3028259e70998ae7a08b4
          • Instruction Fuzzy Hash: 0A329E70A087029FD318CF29C98472AB7E1BF84304F148A3EE89567781D779E955CBDA
          Memory Dump Source
          • Source File: 00000000.00000002.1510866762.00000000069E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 069E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_69e0000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6f3ebbf78d0ed5c7f2dffe9a19763a9a2c8d8fc3f1107b5f2545f76520b2e43b
          • Instruction ID: 0fbf0b7f23dc57619c969a8e3dda3caf26ac4b08a4bdd4852e0d641ca8d42784
          • Opcode Fuzzy Hash: 6f3ebbf78d0ed5c7f2dffe9a19763a9a2c8d8fc3f1107b5f2545f76520b2e43b
          • Instruction Fuzzy Hash: 1022B971E002298FDB68CFA9CD90BEDBBB2AF88300F5481A9D509E7355DA745E85CF50
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
          • Instruction ID: cc67e10771130af0a5279b37c8f7fa75a2653c997645fd1ae8a0b8309c7f2627
          • Opcode Fuzzy Hash: 020392db844ceed98276714fd2150c2ad4a639f6bad3fb02a1d0621011a6745a
          • Instruction Fuzzy Hash: 48E1D6306083514FC708CF28C99456ABBE2EFC5304F198A7EE8D68B386D779D94ACB55
          Memory Dump Source
          • Source File: 00000000.00000002.1507485968.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_27b0000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 8951b8aa3e76bc2ccc1a61df66fafc4f02023fd2eaa253d4af1a46ea822a515f
          • Instruction ID: d5ee736d3b97185eed0b9733252a85ce13eb03007136eb5fdb63e2d742098c8b
          • Opcode Fuzzy Hash: 8951b8aa3e76bc2ccc1a61df66fafc4f02023fd2eaa253d4af1a46ea822a515f
          • Instruction Fuzzy Hash: D812A7B2C917458AE710CF25EDCC1893BA1BB45318FD04A1AD2611F2E9E7B4166EEF4C
          Memory Dump Source
          • Source File: 00000000.00000002.1507647653.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 6005a7600f756fd5097fa1b2bc790d925d7ac9508256c478d4bf622a44b9522b
          • Instruction ID: ad61e9a3884c9866a05bd75b14cdf33d77014c47f40f0df4d57c64148ae1fc16
          • Opcode Fuzzy Hash: 6005a7600f756fd5097fa1b2bc790d925d7ac9508256c478d4bf622a44b9522b
          • Instruction Fuzzy Hash: BDC15C71E00258DFDF25DF66C88079DBBB2AF89304F14C5AAD449AB255DB30E985CFA0
          Memory Dump Source
          • Source File: 00000000.00000002.1506386516.00000000022E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022E0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_22e0000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: a70635f3d8a19360c48ccfe038ea28ddf0685be6efdfcc9f791645a4982515dd
          • Instruction ID: aa6d15dfa87bea9f1a4536bf5cd0f30cd2e41c45f6cdc5f344de3b6202b552a2
          • Opcode Fuzzy Hash: a70635f3d8a19360c48ccfe038ea28ddf0685be6efdfcc9f791645a4982515dd
          • Instruction Fuzzy Hash: 1AA1AC32E1030A8FCF19DFE4C98459EB7B2FF85300B55456AE806AB269DB71E945DF40
          Memory Dump Source
          • Source File: 00000000.00000002.1507485968.00000000027B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 027B0000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_27b0000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 2f82bc77872a8856b0f74054ee5ace475da95ba4bcb0b60e8b0a2ea81399fba0
          • Instruction ID: dd757ab304c152d8e1c4e5f412a3f6914107993b1130fead4053fd3c617872cd
          • Opcode Fuzzy Hash: 2f82bc77872a8856b0f74054ee5ace475da95ba4bcb0b60e8b0a2ea81399fba0
          • Instruction Fuzzy Hash: 86C10BB2C917458BD714CF25ECCC1897BB1BB85314F904B1AD1612B2D8EBB4166EEF48
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
          • Instruction ID: 74c1b90a01db230de662c72faab58802bb742d928f34651097fec506a9751401
          • Opcode Fuzzy Hash: 519d71d31dfe2b71d65c539f7253ce4d0ce1a0c509a5eaaf561cac07154b4855
          • Instruction Fuzzy Hash: 15717072A9155347E39CCF5CECD17763713DBC5351F49C23ACA025B6EAC938A922C688
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
          • Instruction ID: e93c334361593eb17f37b37ed9e80cdb2c00b1b1e1af3e0e9a736190e966ddef
          • Opcode Fuzzy Hash: 56d4400f77c04dc4446d24fbb084ed78fa0beaad766ef6ff58d44a670f1be69a
          • Instruction Fuzzy Hash: 4A615E3266055747E391DF6DEEC47663762EBC9351F18C630CA008B6A6CB39B92297CC
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
          • Instruction ID: 39afabd8a370e1aacf823bb5b0eb141e0e266d105c364ee31248ba7b153c19f0
          • Opcode Fuzzy Hash: f84f8abda09efbfc4fc50908dec446613bf2f52d635c093d4d9c5e236f650133
          • Instruction Fuzzy Hash: 2851F94400D7E18EC716873A44E0AA7BFD10FAB115F4E9ACDA5E90B2E3C159C288DB77
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
          • Instruction ID: cff114a85fcb8f5deb46d81d22c4208fa3965af46b01a687ebeadebabb5a60ab
          • Opcode Fuzzy Hash: 5804b07f674ae3d268ec1438c7da71b35f3107e62f64f1f633515dfb68ee091a
          • Instruction Fuzzy Hash: 9A31D8302052028BE738CE19C954BEBB3B5AFC0349F44883ED986A73C4DABDD945D795
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
          • Instruction ID: 40597224e526abc728bb10992f322fa75c91b34d76fbbe6bc80328d1c420bfc2
          • Opcode Fuzzy Hash: 9961543af999a1320c5b9d9b8c59a9b64f893fc8dbb42675723320a25693eab2
          • Instruction Fuzzy Hash: F321923170520247EB68C929C9547ABB3A5ABC0389F48853EC986A73C8DAB9E941D785
          APIs
          • _malloc.LIBCMT ref: 004057DE
            • Part of subcall function 0040B84D: __FF_MSGBANNER.LIBCMT ref: 0040B870
            • Part of subcall function 0040B84D: __NMSG_WRITE.LIBCMT ref: 0040B877
            • Part of subcall function 0040B84D: RtlAllocateHeap.NTDLL(00000000,-0000000E,00000001,00000000,00000000,?,00411C86,00000001,00000001,00000001,?,0040D66A,00000018,00421240,0000000C,0040D6FB), ref: 0040B8C4
          • _malloc.LIBCMT ref: 00405842
          • _malloc.LIBCMT ref: 00405906
          • _malloc.LIBCMT ref: 00405930
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: _malloc$AllocateHeap
          • String ID: 1.2.3
          • API String ID: 680241177-2310465506
          • Opcode ID: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
          • Instruction ID: 6f54ea0e5a0cddcbb7a6eab5c61130b8c10e9e343dc86a4c4a61a5a67c51a18e
          • Opcode Fuzzy Hash: 64d57b24c90c17737e8f9baa349f19b9f9970d6aaf881d525023fd74c78c4ea3
          • Instruction Fuzzy Hash: 8B61F7B1944B408FD720AF2A888066BBBE0FB45314F548D3FE5D5A3781D739D8498F5A
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: _memset$__filbuf__fileno__getptd_noexit__read_memcpy_s
          • String ID:
          • API String ID: 3886058894-0
          • Opcode ID: c4afc057559a022db8f819d9985b866907c7fad8716f86744927840939a860f5
          • Instruction ID: 0234425abcb0213f77efd30778ac7634d7a408156a07f93f58cd91f86a00e979
          • Opcode Fuzzy Hash: c4afc057559a022db8f819d9985b866907c7fad8716f86744927840939a860f5
          • Instruction Fuzzy Hash: 1E519031A00605ABCB209F69C844A9FBB75EF41324F24863BF825B22D1D7799E51CBDD
          APIs
          • __lock_file.LIBCMT ref: 0040C6C8
          • __fileno.LIBCMT ref: 0040C6D6
          • __fileno.LIBCMT ref: 0040C6E2
          • __fileno.LIBCMT ref: 0040C6EE
          • __fileno.LIBCMT ref: 0040C6FE
            • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
            • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: __fileno$__decode_pointer__getptd_noexit__lock_file
          • String ID: 'B
          • API String ID: 2805327698-2787509829
          • Opcode ID: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
          • Instruction ID: db056c5abb1484b678344f3d998e50672bc49cccd6cfe868de5707b4f3f6250f
          • Opcode Fuzzy Hash: 2b0b2601706cdb465d4c9eff24f73974ea9fb0f2dbbf8fc2cbf9e4943b65d960
          • Instruction Fuzzy Hash: 1A01253231451096C261ABBE5CC246E76A0DE81734726877FF024BB1D2DB3C99429E9D
          APIs
          • __getptd.LIBCMT ref: 00414744
            • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
            • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
          • __getptd.LIBCMT ref: 0041475B
          • __amsg_exit.LIBCMT ref: 00414769
          • __lock.LIBCMT ref: 00414779
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: __amsg_exit__getptd$__getptd_noexit__lock
          • String ID: @.B
          • API String ID: 3521780317-470711618
          • Opcode ID: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
          • Instruction ID: 91aff3cf2d6bbea4e2ea5d49e8e08bf0f41c3eb50374f8394f27d7b6c467aa53
          • Opcode Fuzzy Hash: f43c5434038c0e2b3130a40ea1e7b9b854db78837d0c16722a3a572f716d4dbb
          • Instruction Fuzzy Hash: 60F09631A407009BE720BB66850678D73A06F81719F91456FE4646B2D1CB7C6981CA5D
          APIs
          • __getptd.LIBCMT ref: 00413FD8
            • Part of subcall function 00410735: __getptd_noexit.LIBCMT ref: 00410738
            • Part of subcall function 00410735: __amsg_exit.LIBCMT ref: 00410745
          • __amsg_exit.LIBCMT ref: 00413FF8
          • __lock.LIBCMT ref: 00414008
          • InterlockedDecrement.KERNEL32(?), ref: 00414025
          • InterlockedIncrement.KERNEL32(023B1650), ref: 00414050
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
          • String ID:
          • API String ID: 4271482742-0
          • Opcode ID: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
          • Instruction ID: 77fb08d543caf33888dccec20a3998fa005b1348dfeb798e4aa279577202aa48
          • Opcode Fuzzy Hash: 75ed1ba79165a940210d4fbe753a496d3ed1b888d754918a7527295a16311c61
          • Instruction Fuzzy Hash: 9301A531A01621ABD724AF67990579E7B60AF48764F50442BE814B72D0C77C6DC2CBDD
          APIs
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: __calloc_crt
          • String ID: P$B$`$B
          • API String ID: 3494438863-235554963
          • Opcode ID: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
          • Instruction ID: 4bdca0f49684ef71ac3198dcc3f656e5d5ce7fed137673697bf40858e87bd1f9
          • Opcode Fuzzy Hash: fdf4f6b62053dea64867d0c1085960dee66dbdb5e7cbac4bce55836661d1e8cf
          • Instruction Fuzzy Hash: 6011A3327446115BE7348B1DBD50F662391EB84728BA4423BE619EA7E0E77CD8864A4C
          APIs
          • GetModuleHandleA.KERNEL32(KERNEL32,0040CDF5), ref: 00413615
          • GetProcAddress.KERNEL32(00000000,IsProcessorFeaturePresent), ref: 00413625
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: AddressHandleModuleProc
          • String ID: IsProcessorFeaturePresent$KERNEL32
          • API String ID: 1646373207-3105848591
          • Opcode ID: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
          • Instruction ID: 3bb3582238f4ecb0ba7b9e8fe578e45fdcf0af3c55e5dfe2a5e3893bc0ad87fb
          • Opcode Fuzzy Hash: 118b5162a474c003ae69c9300a13838c9d8123de4a3b48a289e819fb4020d245
          • Instruction Fuzzy Hash: 96F06230600A09E2DB105FA1ED1E2EFBB74BB80746F5101A19196B0194DF38D0B6825A
          APIs
          • ___addlocaleref.LIBCMT ref: 0041470C
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(00000001), ref: 004145E4
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 004145F1
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 004145FE
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 0041460B
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414618
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414634
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 00414644
            • Part of subcall function 004145D2: InterlockedIncrement.KERNEL32(?), ref: 0041465A
          • ___removelocaleref.LIBCMT ref: 00414717
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 0041467B
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 00414688
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 00414695
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146A2
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146AF
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146CB
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(00000000), ref: 004146DB
            • Part of subcall function 00414661: InterlockedDecrement.KERNEL32(?), ref: 004146F1
          • ___freetlocinfo.LIBCMT ref: 0041472B
            • Part of subcall function 00414489: ___free_lconv_mon.LIBCMT ref: 004144CF
            • Part of subcall function 00414489: ___free_lconv_num.LIBCMT ref: 004144F0
            • Part of subcall function 00414489: ___free_lc_time.LIBCMT ref: 00414575
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
          • String ID: @.B
          • API String ID: 467427115-470711618
          • Opcode ID: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
          • Instruction ID: 8e9b8205a585dc9325c25650a27042e0212317e7447dcce9b0fe23aa5a8dd77f
          • Opcode Fuzzy Hash: 3857329619949c293296419ec2be8f51648e9d3bf58d3a63f1cc8ec60b1035b6
          • Instruction Fuzzy Hash: BDE0863250192255CE35261D76806EF93A98FD3725B3A017FF864AF7D8EB2C4CC0809D
          APIs
          • __fileno.LIBCMT ref: 0040C77C
          • __locking.LIBCMT ref: 0040C791
            • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
            • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: __decode_pointer__fileno__getptd_noexit__locking
          • String ID:
          • API String ID: 2395185920-0
          • Opcode ID: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
          • Instruction ID: 30055f4621fb528cea72007990449f1feb1a7f288d573051c200dc5e1a244c20
          • Opcode Fuzzy Hash: a22d1fa1ad15e425548c743ff76317c9d1fdeb5a65110bd21edd49740b19d0ba
          • Instruction Fuzzy Hash: CC51CF72E00209EBDB10AF69C9C0B59BBA1AF01355F14C27AD915B73D1D378AE41DB8D
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: _fseek_malloc_memset
          • String ID:
          • API String ID: 208892515-0
          • Opcode ID: 689e5a2a8d0df6628a55ca55f65915ee6a0b33bdec45a2b9390eeacb6c5b01b1
          • Instruction ID: b5a371ba5f9a3ad1fa090fb1a89082137fe8d6c03bc5c52cd66242ccf2a60741
          • Opcode Fuzzy Hash: 689e5a2a8d0df6628a55ca55f65915ee6a0b33bdec45a2b9390eeacb6c5b01b1
          • Instruction Fuzzy Hash: 3541A572600F018AD630972EE804B2772E5DF90364F140A3FE9E6E27D5E738E9458F89
          APIs
          • __flush.LIBCMT ref: 0040BB6E
          • __fileno.LIBCMT ref: 0040BB8E
          • __locking.LIBCMT ref: 0040BB95
          • __flsbuf.LIBCMT ref: 0040BBC0
            • Part of subcall function 0040BFC1: __getptd_noexit.LIBCMT ref: 0040BFC1
            • Part of subcall function 0040E744: __decode_pointer.LIBCMT ref: 0040E74F
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: __decode_pointer__fileno__flsbuf__flush__getptd_noexit__locking
          • String ID:
          • API String ID: 3240763771-0
          • Opcode ID: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
          • Instruction ID: 72eaa501f89e5d914343e0f007c81726c853b1270fdaa85e4c7363b387074608
          • Opcode Fuzzy Hash: ce0de872f2bf1c80b5409081606229fa9c8f65028ffa0700073288fbc1af180c
          • Instruction Fuzzy Hash: B441A331A006059BDF249F6A88855AFB7B5EF80320F24853EE465B76C4D778EE41CB8C
          APIs
          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 004152D3
          • __isleadbyte_l.LIBCMT ref: 00415307
          • MultiByteToWideChar.KERNEL32(00000080,00000009,?,?,?,00000000,?,?,?,?), ref: 00415338
          • MultiByteToWideChar.KERNEL32(00000080,00000009,?,00000001,?,00000000,?,?,?,?), ref: 004153A6
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
          • String ID:
          • API String ID: 3058430110-0
          • Opcode ID: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
          • Instruction ID: 094900ada7e667e90e346a2540d450e67f5821ec0926a3c2ae07879bc245b0d1
          • Opcode Fuzzy Hash: 2839bf6a935194de417e4e3b9e78947074703b487fc663d1488f120054b34ef5
          • Instruction Fuzzy Hash: 1831A032A00649EFDB20DFA4C8809EE7BB5EF41350B1885AAE8659B291D374DD80DF59
          APIs
          Memory Dump Source
          • Source File: 00000000.00000002.1505223066.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1505186132.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505248370.000000000041B000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505271444.0000000000422000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505291294.0000000000426000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1505310948.000000000045C000.00000004.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_loader.jbxd
          Similarity
          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
          • String ID:
          • API String ID: 3016257755-0
          • Opcode ID: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
          • Instruction ID: bfd0e68975b3765f24e543ba70b005e9871d43ed2f52156b65e62ceec70126f9
          • Opcode Fuzzy Hash: bfaf9c04f800815b6471d517da42daec28121d5ec88fca071302ba537a085f53
          • Instruction Fuzzy Hash: DA117E7200014EBBCF125E85CC418EE3F27BF18755B58841AFE2858130D73BCAB2AB89