Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Analysis ID:1542454
MD5:a57dad8c1dae1fa551709713fa74bbee
SHA1:42bc8573f4eb0a5e1ee83b7bce5dcc952526cb88
SHA256:3744aed5783f8ffd6dff8d8beb8bfccf8abd1320bc86f58d281f29bc58695ec0
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe (PID: 6192 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5: A57DAD8C1DAE1FA551709713FA74BBEE)
    • conhost.exe (PID: 792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 4536 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 3800 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 3848 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 3160 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 352 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 4620 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 5880 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 6676 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 5064 cmdline: C:\Windows\system32\WerFault.exe -u -p 6192 -s 676 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.3% probability
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000000.1459676362.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_53610d80-f
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: d:\ied_sec_client_proj\trunk\tessafe\Bin\amd64\TesSafe64.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: d:\sandbox\154167\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: C:\Users\gg\Desktop\projects\KernelVault\keyauth-cpp-library-main clix\DriverLoader2\DriverLoader2\x64\Release\DriverLoader2.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1545967792.0000005685F2D000.00000004.00000010.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/ace
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/m
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.8:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF63FB066800_2_00007FF63FB06680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6192 -s 676
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000000.1459676362.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000000.1459676362.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTesSafe64.sys vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTesSafe64.sys vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary or memory string: OriginalFilenameTesSafe64.sys vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary string: TesSafe\Device\TesSafe\DosDevices\TesSafe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary string: \Device\Nal
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ndows\System32\OpenSSH\;C:\Users\user\AppData\Local\Microsoft\WindowsApps;PATHEXT=.COM;.EXE;.BAT;.CMD;.VBP%P
Source: classification engineClassification label: mal56.winEXE@18/5@1/2
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6192
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5880:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:792:120:WilError_03
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\8afd3bbb-ed85-46ab-b059-5cde31b96de3Jump to behavior
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeReversingLabs: Detection: 23%
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6192 -s 676
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic file information: File size 3873408 > 1048576
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2e6a00
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: d:\ied_sec_client_proj\trunk\tessafe\Bin\amd64\TesSafe64.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: d:\sandbox\154167\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: C:\Users\gg\Desktop\projects\KernelVault\keyauth-cpp-library-main clix\DriverLoader2\DriverLoader2\x64\Release\DriverLoader2.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeAPI coverage: 0.7 %
Source: C:\Windows\System32\timeout.exe TID: 2844Thread sleep count: 39 > 30Jump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: Amcache.hve.13.drBinary or memory string: VMware
Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.13.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.13.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.13.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.13.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.13.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.13.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.13.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.13.drBinary or memory string: vmci.sys
Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.13.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.13.drBinary or memory string: VMware20,1
Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.13.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.13.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.13.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.13.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF63FCD1A58 __vcrt_InitializeCriticalSectionEx,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF63FCD1A58
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF63FCD1A58 __vcrt_InitializeCriticalSectionEx,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF63FCD1A58
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF63FB2EE60 GetProcessHeap,0_2_00007FF63FB2EE60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF63FCD212C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF63FCD212C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF63FCD1278
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF63FCD2BA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF63FCD2BA0
Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.13.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.13.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1542454 Sample: SecuriteInfo.com.Variant.Te... Startdate: 25/10/2024 Architecture: WINDOWS Score: 56 32 keyauth.win 2->32 38 Multi AV Scanner detection for submitted file 2->38 40 Machine Learning detection for sample 2->40 42 AI detected suspicious sample 2->42 9 SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe 1 2->9         started        signatures3 process4 dnsIp5 34 keyauth.win 104.26.0.5, 443, 49708 CLOUDFLARENETUS United States 9->34 36 127.0.0.1 unknown unknown 9->36 12 cmd.exe 1 9->12         started        14 cmd.exe 1 9->14         started        16 WerFault.exe 19 16 9->16         started        18 conhost.exe 9->18         started        process6 process7 20 certutil.exe 3 1 12->20         started        22 find.exe 1 12->22         started        24 find.exe 1 12->24         started        26 cmd.exe 1 14->26         started        process8 28 conhost.exe 26->28         started        30 timeout.exe 1 26->30         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe24%ReversingLabs
SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.2/aceSecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      http://upx.sf.netAmcache.hve.13.drfalse
      • URL Reputation: safe
      unknown
      https://keyauth.win/api/1.2/mSecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Variant.Tedy.627915.599.8749.exefalse
        • URL Reputation: safe
        unknown
        https://keyauth.win/api/1.2/SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1545967792.0000005685F2D000.00000004.00000010.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.1546111011.000001ED1FF9C000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.26.0.5
          keyauth.winUnited States
          13335CLOUDFLARENETUSfalse
          IP
          127.0.0.1
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1542454
          Start date and time:2024-10-25 23:42:13 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 45s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:21
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
          Detection:MAL
          Classification:mal56.winEXE@18/5@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.189.173.21
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
          TimeTypeDescription
          17:43:25API Interceptor1x Sleep call for process: WerFault.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          104.26.0.5lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
            xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
              LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                  4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                    xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                      dGuXzI4UlT.exeGet hashmaliciousUnknownBrowse
                        vjlICWbvGT.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.Win64.MalwareX-gen.27133.15456.exeGet hashmaliciousUnknownBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              keyauth.winlUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                              • 104.26.1.5
                              xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              dGuXzI4UlT.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              vjlICWbvGT.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUSZl5QaBwsTJ.exeGet hashmaliciousStealcBrowse
                              • 104.21.56.70
                              https://louisianalaw.us/awI1AlsoTxn2APQ3EspQ3E4RAI1AoTxnz01coTxm&c=E,1,vvMSQz5CSzvUF_pnZgRSmb_4_6IhFVsFaIdJFKN2k78xDXcVLKO_NH-275AIvCQYfKD3jL3qc4bCIgEC2N6Rr4xli-ez6GBrwxbUrVz5hy4g&typo=1Get hashmaliciousUnknownBrowse
                              • 188.114.96.3
                              https://certify.us.com/D5QkoQ3Eniw4G2APQ3ED5QpQ3E4RAionz01coq01Get hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              Setup.exeGet hashmaliciousLummaC StealerBrowse
                              • 188.114.97.3
                              Setup.exeGet hashmaliciousLummaC StealerBrowse
                              • 188.114.97.3
                              setup.exeGet hashmaliciousLummaCBrowse
                              • 188.114.96.3
                              sgM0Akbldk.exeGet hashmaliciousStealcBrowse
                              • 172.67.179.207
                              5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                              • 188.114.97.3
                              https://deborahmeagher.com.de/kfOoB/Get hashmaliciousHTMLPhisherBrowse
                              • 104.17.25.14
                              VAIIBIHmtT.exeGet hashmaliciousStealcBrowse
                              • 104.21.56.70
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ce5f3254611a8c095a3d821d44539877lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              fox vanguard bypass.exeGet hashmaliciousUnknownBrowse
                              • 104.26.0.5
                              No context
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):65536
                              Entropy (8bit):0.9201974073766187
                              Encrypted:false
                              SSDEEP:96:q1TFUMr8dsChqtY7q4BSFQXIDcQlc6WcE8cw3d/5+HbHg/8BRTf3o8Fa9KUNsPQz:wj8dqV+07SmJGjHOzuiFdZ24lO8J
                              MD5:487B852A45AFE8D913BF35E390DE3936
                              SHA1:26C5DE02DA39B2DE0D9ACD489BB43B1B106A1E6E
                              SHA-256:12DF46916CD84173183A7C972953FC779B39DC9E1EA9BA095BB99EEED9545E81
                              SHA-512:56F9683ED75E9E191838E070E6BA17E0328C83059D149796F7CB03D782D13BAF32EB7941D2E7D5EA54B675FAB3C073AE503686BF0B2BCAFC846918D4B03CE8B6
                              Malicious:false
                              Reputation:low
                              Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.3.6.6.1.9.9.9.6.4.6.7.8.0.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.3.6.6.2.0.0.4.6.4.6.7.3.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.2.c.e.b.5.d.7.-.5.d.f.2.-.4.7.6.a.-.9.f.3.0.-.4.9.7.b.d.5.2.2.f.0.3.4.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.4.7.8.c.2.a.5.-.f.f.3.b.-.4.6.a.6.-.8.9.b.6.-.3.7.6.4.7.4.9.9.5.5.b.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...V.a.r.i.a.n.t...T.e.d.y...6.2.7.9.1.5...5.9.9...8.7.4.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.3.0.-.0.0.0.1.-.0.0.1.4.-.2.d.d.0.-.e.4.e.6.2.6.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.8.d.8.5.3.c.7.1.5.f.1.2.d.1.e.9.e.d.0.a.8.8.3.a.d.f.0.8.7.5.a.0.0.0.0.f.f.f.f.!.0.0.0.0.4.2.b.c.8.5.7.3.f.4.e.b.0.a.5.e.1.e.e.8.3.b.7.b.c.e.5.d.c.c.9.5.2.5.2.6.c.b.8.8.!.S.e.c.u.r.i.t.e.I.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:Mini DuMP crash report, 14 streams, Fri Oct 25 21:43:20 2024, 0x1205a4 type
                              Category:dropped
                              Size (bytes):161222
                              Entropy (8bit):1.6008980779582418
                              Encrypted:false
                              SSDEEP:384:xNIvegXClRvDDo6oz+jUYmWKidORRKqT6wGL1l:AvPXClRvAYWm1l
                              MD5:1CB622D032CD3294A41CC7EE4CA43BA7
                              SHA1:D899DFB17361D76ABE591B56886D7315C1283ED4
                              SHA-256:79943384A0CBCD812B51F81F6C9BD1DE1F20B8D06D1E2F98DB259C3D8C74528F
                              SHA-512:9DF118635C135A83717EAF44345F3B59A1A259599DF1DFFE002DB297EAAD28CB8B2A890D4D58A39DC487EDE9D589405BAEAE24F21881DF02071BF8A0F98EFE73
                              Malicious:false
                              Preview:MDMP..a..... ..........g....................................4....7..........T.......8...........T...............&[......................................................................................................eJ......\.......Lw......................T.......0......g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):9022
                              Entropy (8bit):3.702078980260712
                              Encrypted:false
                              SSDEEP:192:R6l7wVeJqZP6v6YS5xgmfp0npDO89bufj8fiam:R6lXJsP6v6Ycxgmfp0lufYf2
                              MD5:2A228AF2BE49DB6E8EA0D716326B8A47
                              SHA1:96381587733970EAD73C7A09DC965075FA700BD6
                              SHA-256:56D72A3C72ACD290490DAE62CE7B7E1F649B3391508FA48DDF3A1E8BCC8A88C5
                              SHA-512:61B5DFA67190E8BFC5D24A81EBFAD33783A78A6E31CB56DE68E053667E6B0ABF1AA4DA18C66E0B733529ACBE9A58FEECB7FBCD466220979F693D1634DC12E653
                              Malicious:false
                              Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.1.9.2.<./.P.i.
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                              Category:dropped
                              Size (bytes):5001
                              Entropy (8bit):4.546833758774734
                              Encrypted:false
                              SSDEEP:96:uIjfNI7987VMJ/IA2MmWQA2MCpY+oo+fd:uIxY987e/IA2MGA2MCpY+T+1
                              MD5:791335EAB9667F94AC8B44CBFE11C9FA
                              SHA1:EAFC5603D5191B35B7506BF4D43E2F10F8179B82
                              SHA-256:E9DBFC4D41B3C6D3597E72733DD3D4EBEE0C70CE07C12EA1F387062CAE55FEFC
                              SHA-512:F2328F6B4CF5054F21B7E46FD7AD07835925177421BBEE62A1A96A6A5A5254BB7C99E2201C8EF682ABF5C0285AC2706D6C8E9B63418E7448A8BCB21615421831
                              Malicious:false
                              Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="559486" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                              Process:C:\Windows\System32\WerFault.exe
                              File Type:MS Windows registry file, NT/2000 or above
                              Category:dropped
                              Size (bytes):1835008
                              Entropy (8bit):4.372418593231094
                              Encrypted:false
                              SSDEEP:6144:iFVfpi6ceLP/9skLmb0YyWWSPtaJG8nAge35OlMMhA2AX4WABlguNciL:qV1myWWI/glMM6kF76q
                              MD5:FD882D37872CB00481E2605184212A99
                              SHA1:B9EDD96D1FF7BD23D9045F09BB8B76CCFCCEA5FD
                              SHA-256:504BF5E09AFB5CEDBEAC0A7DAA9DF17507FA020C1EC529CBB0D046E240E9CC5C
                              SHA-512:C056463B80F59378A2BDEE361418A27A4FD322FB366DCD99B2525B3903AD010445BAD02E6932284BED6D83B94FB1706536199F3E8BFB3D8A30C8A0E17E950A6D
                              Malicious:false
                              Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmNKf.&'...............................................................................................................................................................................................................................................................................................................................................6q.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                              File type:PE32+ executable (console) x86-64, for MS Windows
                              Entropy (8bit):6.317056142370199
                              TrID:
                              • Win64 Executable Console (202006/5) 92.65%
                              • Win64 Executable (generic) (12005/4) 5.51%
                              • Generic Win/DOS Executable (2004/3) 0.92%
                              • DOS Executable Generic (2002/1) 0.92%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
                              File size:3'873'408 bytes
                              MD5:a57dad8c1dae1fa551709713fa74bbee
                              SHA1:42bc8573f4eb0a5e1ee83b7bce5dcc952526cb88
                              SHA256:3744aed5783f8ffd6dff8d8beb8bfccf8abd1320bc86f58d281f29bc58695ec0
                              SHA512:49dfa57823633adcb1d4ff878136bc5dfbe357f526c4d5aa8f4e4f464ee6d34349a4df5e68aa4ed0de32d64c42f44488404bb0967e408df00ea39dfa6f1fc1b7
                              SSDEEP:49152:cCC5fA3V7/6Qqj2jsJRyhQ8jl4SAc6Li:c/VA/d5QSaL
                              TLSH:14066B065BEED0D8C070407821863217E6327C480A2ADBF71FD08B9667E776966BFF56
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2S..v2..v2..v2...J..`2....x.~2......r2......|2......S2......p2...B...2..=J..k2..v2...3..e...q2..e...t2..e.z.w2..e...w2..Richv2.
                              Icon Hash:00928e8e8686b000
                              Entrypoint:0x1402e262c
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x140000000
                              Subsystem:windows cui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                              Time Stamp:0x66C54A5D [Wed Aug 21 02:01:01 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:6
                              OS Version Minor:0
                              File Version Major:6
                              File Version Minor:0
                              Subsystem Version Major:6
                              Subsystem Version Minor:0
                              Import Hash:5315b8464aa682f0e3d3b00df735a946
                              Instruction
                              dec eax
                              sub esp, 28h
                              call 00007FD220F61C00h
                              dec eax
                              add esp, 28h
                              jmp 00007FD220F61507h
                              int3
                              int3
                              dec eax
                              mov dword ptr [esp+10h], ebx
                              dec eax
                              mov dword ptr [esp+18h], esi
                              push ebp
                              push edi
                              inc ecx
                              push esi
                              dec eax
                              mov ebp, esp
                              dec eax
                              sub esp, 10h
                              xor eax, eax
                              xor ecx, ecx
                              cpuid
                              inc esp
                              mov eax, ecx
                              inc esp
                              mov edx, edx
                              inc ecx
                              xor edx, 49656E69h
                              inc ecx
                              xor eax, 6C65746Eh
                              inc esp
                              mov ecx, ebx
                              inc esp
                              mov esi, eax
                              xor ecx, ecx
                              mov eax, 00000001h
                              cpuid
                              inc ebp
                              or edx, eax
                              mov dword ptr [ebp-10h], eax
                              inc ecx
                              xor ecx, 756E6547h
                              mov dword ptr [ebp-0Ch], ebx
                              inc ebp
                              or edx, ecx
                              mov dword ptr [ebp-08h], ecx
                              mov edi, ecx
                              mov dword ptr [ebp-04h], edx
                              jne 00007FD220F616EDh
                              dec eax
                              or dword ptr [000B7A85h], FFFFFFFFh
                              and eax, 0FFF3FF0h
                              dec eax
                              mov dword ptr [000B7A6Dh], 00008000h
                              cmp eax, 000106C0h
                              je 00007FD220F616BAh
                              cmp eax, 00020660h
                              je 00007FD220F616B3h
                              cmp eax, 00020670h
                              je 00007FD220F616ACh
                              add eax, FFFCF9B0h
                              cmp eax, 20h
                              jnbe 00007FD220F616B6h
                              dec eax
                              mov ecx, 00010001h
                              add dword ptr [eax], eax
                              add byte ptr [eax], al
                              dec eax
                              bt ecx, eax
                              jnc 00007FD220F616A6h
                              inc esp
                              mov eax, dword ptr [000B8D5Bh]
                              inc ecx
                              or eax, 01h
                              inc esp
                              mov dword ptr [000B8D50h], eax
                              Programming Language:
                              • [IMP] VS2008 SP1 build 30729
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x3961400x21c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3a60000x1e0.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x39c0000x9abc.pdata
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a70000x600.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x32d2a00x70.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x32d3800x28.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x32d1600x140.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x2e80000xd78.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x2e68900x2e6a00249b1edcc5d16a058e72c3d76adff375unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x2e80000xb1e9e0xb20002243bfab32c6ece4826bbca0b59165afFalse0.4939239159058989data6.847170492622551IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x39a0000x14880xa00fc2b7bf89c934172bbfecdd94ba069e5False0.217578125data4.052491232704579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .pdata0x39c0000x9abc0x9c005929590dd1d4dbba8e1518d3f590e613False0.4462139423076923data5.977831928262313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .rsrc0x3a60000x1e00x2006b3b1701e7ba0fd5f2721ec922bfab3fFalse0.52734375data4.70672250389512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x3a70000x6000x60004e47fa203d86d5e6d8e4bbe9c50c4d6False0.5904947916666666data5.362807738496344IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_MANIFEST0x3a60600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                              DLLImport
                              KERNEL32.dllLocalFree, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameW, GetModuleFileNameA, InitializeSListHead, GetSystemTimeAsFileTime, IsProcessorFeaturePresent, TerminateProcess, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, IsDebuggerPresent, GetFileInformationByHandleEx, AreFileApisANSI, DeviceIoControl, GetFileAttributesExW, FindFirstFileW, FindClose, CreateDirectoryW, GetCurrentDirectoryW, GetLocaleInfoEx, GetFileSizeEx, CreateFileA, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetStdHandle, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, FreeLibrary, QueryPerformanceFrequency, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, WideCharToMultiByte, GetCurrentProcessId, GetCurrentThreadId, VirtualAlloc, VirtualFree, GetProcAddress, GetSystemDirectoryA, GetTempPathW, CreateFileW, SetUnhandledExceptionFilter, GetCurrentProcess, Sleep, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, HeapDestroy, GetLastError, CloseHandle, OutputDebugStringW
                              USER32.dllMessageBoxA
                              ADVAPI32.dllCryptEncrypt, GetUserNameA, IsValidSid, GetTokenInformation, GetLengthSid, CopySid, OpenProcessToken, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, RegCloseKey, RegCreateKeyW, RegOpenKeyW, RegSetKeyValueW, RegDeleteTreeW, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CloseServiceHandle, StartServiceA, OpenServiceA, OpenSCManagerA, DeleteService, CreateServiceA, ConvertSidToStringSidW
                              SHELL32.dllShellExecuteA
                              MSVCP140.dll?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ, ?fill@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WXZ, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?widen@?$ctype@_W@std@@QEBA_WD@Z, ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?id@?$ctype@_W@std@@2V0locale@2@A, ?_Xinvalid_argument@std@@YAXPEBD@Z, ?is@?$ctype@D@std@@QEBA_NFD@Z, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?rdstate@ios_base@std@@QEBAHXZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Pnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z, ?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?_Gnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?_Gninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ??7ios_base@std@@QEBA_NXZ, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Xbad_function_call@std@@YAXXZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?width@ios_base@std@@QEAA_J_J@Z, ?width@ios_base@std@@QEBA_JXZ, ?setf@ios_base@std@@QEAAHHH@Z, ?flags@ios_base@std@@QEBAHXZ, ?good@ios_base@std@@QEBA_NXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ??Bid@locale@std@@QEAA_KXZ, ?tie@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_ostream@_WU?$char_traits@_W@std@@@2@XZ, ?_Winerror_map@std@@YAHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?uncaught_exceptions@std@@YAHXZ, ?_Xout_of_range@std@@YAXPEBD@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z
                              Normaliz.dllIdnToAscii
                              WLDAP32.dll
                              CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertOpenStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertAddCertificateContextToStore
                              WS2_32.dllWSAGetLastError, getpeername, recv, closesocket, bind, connect, getsockname, getsockopt, htons, ntohs, ntohl, socket, WSASetLastError, WSAIoctl, WSAStartup, select, WSACleanup, accept, gethostname, listen, ioctlsocket, __WSAFDIsSet, freeaddrinfo, getaddrinfo, recvfrom, send, sendto, setsockopt, htonl
                              SHLWAPI.dllPathFindFileNameW
                              RPCRT4.dllRpcStringFreeA, UuidToStringA, UuidCreate
                              USERENV.dllUnloadUserProfile
                              ntdll.dllRtlCaptureContext, VerSetConditionMask, RtlInitUnicodeString, NtQuerySystemInformation, RtlLookupFunctionEntry, RtlVirtualUnwind
                              VCRUNTIME140.dll__C_specific_handler, strrchr, __current_exception_context, memset, memcpy, strstr, __current_exception, _purecall, wcsstr, memmove, memcmp, memchr, __std_exception_copy, _CxxThrowException, strchr, __std_exception_destroy
                              VCRUNTIME140_1.dll__CxxFrameHandler4
                              api-ms-win-crt-runtime-l1-1-0.dll_c_exit, __p___argv, __p___argc, terminate, _set_app_type, _seh_filter_exe, system, _resetstkoflw, _configure_narrow_argv, _invalid_parameter_noinfo, _beginthreadex, _invalid_parameter_noinfo_noreturn, _exit, _cexit, _crt_atexit, exit, _initterm_e, _register_thread_local_exe_atexit_callback, abort, _initterm, _initialize_narrow_environment, strerror, _getpid, _register_onexit_function, __sys_nerr, _get_initial_narrow_environment, _errno, _initialize_onexit_table
                              api-ms-win-crt-heap-l1-1-0.dllfree, calloc, _recalloc, _callnewh, realloc, malloc, _set_new_mode
                              api-ms-win-crt-convert-l1-1-0.dllatoi, strtod, strtol, strtoul, strtoll, strtoull
                              api-ms-win-crt-environment-l1-1-0.dllgetenv
                              api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf, __acrt_iob_func, fseek, _lseeki64, ftell, feof, fgets, _open, _close, _write, _get_stream_buffer_pointers, _read, __p__commode, fclose, fflush, fgetc, fgetpos, _set_fmode, __stdio_common_vsprintf, fopen, fputs, ungetc, setvbuf, _popen, _pclose, fwrite, _fseeki64, fsetpos, fread, fputc
                              api-ms-win-crt-filesystem-l1-1-0.dll_wremove, _stat64, remove, _lock_file, _fstat64, _access, _unlink, _unlock_file
                              api-ms-win-crt-time-l1-1-0.dll_localtime64, _gmtime64, strftime, _time64
                              api-ms-win-crt-locale-l1-1-0.dlllocaleconv, ___lc_codepage_func, _configthreadlocale
                              api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dsign, _dclass
                              api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcmp, strcspn, _stricmp, strspn, isupper, strncpy, strncmp, tolower, _strdup
                              api-ms-win-crt-utility-l1-1-0.dllrand, qsort, srand
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 25, 2024 23:43:18.328866959 CEST49708443192.168.2.8104.26.0.5
                              Oct 25, 2024 23:43:18.328880072 CEST44349708104.26.0.5192.168.2.8
                              Oct 25, 2024 23:43:18.328963041 CEST49708443192.168.2.8104.26.0.5
                              Oct 25, 2024 23:43:18.341336012 CEST49708443192.168.2.8104.26.0.5
                              Oct 25, 2024 23:43:18.341347933 CEST44349708104.26.0.5192.168.2.8
                              Oct 25, 2024 23:43:18.981379032 CEST44349708104.26.0.5192.168.2.8
                              Oct 25, 2024 23:43:18.981463909 CEST49708443192.168.2.8104.26.0.5
                              Oct 25, 2024 23:43:19.915277958 CEST49708443192.168.2.8104.26.0.5
                              Oct 25, 2024 23:43:19.915294886 CEST44349708104.26.0.5192.168.2.8
                              Oct 25, 2024 23:43:19.915409088 CEST49708443192.168.2.8104.26.0.5
                              Oct 25, 2024 23:43:19.915798903 CEST44349708104.26.0.5192.168.2.8
                              Oct 25, 2024 23:43:19.915957928 CEST49708443192.168.2.8104.26.0.5
                              TimestampSource PortDest PortSource IPDest IP
                              Oct 25, 2024 23:43:18.312115908 CEST5425253192.168.2.81.1.1.1
                              Oct 25, 2024 23:43:18.322671890 CEST53542521.1.1.1192.168.2.8
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Oct 25, 2024 23:43:18.312115908 CEST192.168.2.81.1.1.10xde49Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Oct 25, 2024 23:43:18.322671890 CEST1.1.1.1192.168.2.80xde49No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                              Oct 25, 2024 23:43:18.322671890 CEST1.1.1.1192.168.2.80xde49No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                              Oct 25, 2024 23:43:18.322671890 CEST1.1.1.1192.168.2.80xde49No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:17:43:17
                              Start date:25/10/2024
                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe"
                              Imagebase:0x7ff63f9f0000
                              File size:3'873'408 bytes
                              MD5 hash:A57DAD8C1DAE1FA551709713FA74BBEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:low
                              Has exited:true

                              Target ID:1
                              Start time:17:43:17
                              Start date:25/10/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6ee680000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:3
                              Start time:17:43:17
                              Start date:25/10/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                              Imagebase:0x7ff6086e0000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:4
                              Start time:17:43:17
                              Start date:25/10/2024
                              Path:C:\Windows\System32\certutil.exe
                              Wow64 process (32bit):false
                              Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5
                              Imagebase:0x7ff72f6b0000
                              File size:1'651'712 bytes
                              MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:5
                              Start time:17:43:17
                              Start date:25/10/2024
                              Path:C:\Windows\System32\find.exe
                              Wow64 process (32bit):false
                              Commandline:find /i /v "md5"
                              Imagebase:0x7ff7be990000
                              File size:17'920 bytes
                              MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:6
                              Start time:17:43:17
                              Start date:25/10/2024
                              Path:C:\Windows\System32\find.exe
                              Wow64 process (32bit):false
                              Commandline:find /i /v "certutil"
                              Imagebase:0x7ff7be990000
                              File size:17'920 bytes
                              MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:7
                              Start time:17:43:19
                              Start date:25/10/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                              Imagebase:0x7ff6086e0000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:8
                              Start time:17:43:19
                              Start date:25/10/2024
                              Path:C:\Windows\System32\cmd.exe
                              Wow64 process (32bit):false
                              Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                              Imagebase:0x7ff6086e0000
                              File size:289'792 bytes
                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:9
                              Start time:17:43:19
                              Start date:25/10/2024
                              Path:C:\Windows\System32\conhost.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                              Imagebase:0x7ff6ee680000
                              File size:862'208 bytes
                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Target ID:12
                              Start time:17:43:19
                              Start date:25/10/2024
                              Path:C:\Windows\System32\timeout.exe
                              Wow64 process (32bit):false
                              Commandline:timeout /t 5
                              Imagebase:0x7ff6bb7e0000
                              File size:32'768 bytes
                              MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:moderate
                              Has exited:true

                              Target ID:13
                              Start time:17:43:19
                              Start date:25/10/2024
                              Path:C:\Windows\System32\WerFault.exe
                              Wow64 process (32bit):false
                              Commandline:C:\Windows\system32\WerFault.exe -u -p 6192 -s 676
                              Imagebase:0x7ff7dce40000
                              File size:570'736 bytes
                              MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Reputation:high
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:0.4%
                                Dynamic/Decrypted Code Coverage:0%
                                Signature Coverage:1.3%
                                Total number of Nodes:77
                                Total number of Limit Nodes:4
                                execution_graph 14740 7ff63fc29940 14741 7ff63fc29971 HandleT type_info::_name_internal_method 14740->14741 14744 7ff63fb05ae0 14741->14744 14745 7ff63fb05b11 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token::_FromImpl 14744->14745 14747 7ff63fb05ba0 Concurrency::task_continuation_context::task_continuation_context 14745->14747 14754 7ff63fb2fe30 14745->14754 14766 7ff63fcd20e0 14747->14766 14755 7ff63fb2fe48 14754->14755 14775 7ff63fb2feb0 14755->14775 14758 7ff63fb0c530 14759 7ff63fb0c567 HandleT Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock allocator _Find_unchecked type_info::_name_internal_method 14758->14759 14760 7ff63fcd20e0 _Find_unchecked 8 API calls 14759->14760 14761 7ff63fb05b84 14760->14761 14762 7ff63fb195e0 14761->14762 14763 7ff63fb19601 14762->14763 14764 7ff63fb195f4 14762->14764 14763->14747 14823 7ff63fb339c0 14764->14823 14768 7ff63fcd20e9 14766->14768 14767 7ff63fb05bb9 14768->14767 14769 7ff63fcd2160 IsProcessorFeaturePresent 14768->14769 14770 7ff63fcd2178 14769->14770 14848 7ff63fcd2358 RtlCaptureContext 14770->14848 14776 7ff63fb2fef8 Concurrency::details::WorkQueue::IsStructuredEmpty 14775->14776 14779 7ff63fb04790 14776->14779 14782 7ff63fb34320 14779->14782 14783 7ff63fb34338 allocator 14782->14783 14786 7ff63fb04730 14783->14786 14787 7ff63fb04745 allocator 14786->14787 14793 7ff63fb04741 14786->14793 14788 7ff63fb04751 14787->14788 14789 7ff63fb0475d 14787->14789 14804 7ff63fb2fd30 14788->14804 14791 7ff63fb04774 14789->14791 14792 7ff63fb04768 14789->14792 14795 7ff63fb2fd30 allocator 2 API calls 14791->14795 14796 7ff63fb04a10 14792->14796 14793->14758 14795->14793 14797 7ff63fb04a33 14796->14797 14798 7ff63fb04a38 14796->14798 14807 7ff63fb33510 14797->14807 14799 7ff63fb2fd30 allocator 2 API calls 14798->14799 14801 7ff63fb04a43 14799->14801 14802 7ff63fb04a52 _invalid_parameter_noinfo_noreturn 14801->14802 14803 7ff63fb04a65 14801->14803 14802->14801 14802->14802 14803->14793 14812 7ff63fcd1b34 14804->14812 14810 7ff63fb186e0 14807->14810 14809 7ff63fb3351e _CxxThrowException 14809->14798 14811 7ff63fb186fa std::bad_alloc::bad_alloc 14810->14811 14811->14809 14813 7ff63fcd1b4e malloc 14812->14813 14814 7ff63fcd1b3f 14813->14814 14815 7ff63fb2fd43 14813->14815 14814->14813 14816 7ff63fcd1b5e 14814->14816 14815->14793 14818 7ff63fcd1b69 std::_Facet_Register 14816->14818 14819 7ff63fcd2930 14816->14819 14822 7ff63fcd2910 14819->14822 14821 7ff63fcd293e _CxxThrowException 14822->14821 14825 7ff63fb339d3 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::task_continuation_context::task_continuation_context 14823->14825 14824 7ff63fb33a60 14824->14763 14825->14824 14827 7ff63fb42820 14825->14827 14830 7ff63fb073c0 14827->14830 14831 7ff63fb073d3 allocator 14830->14831 14832 7ff63fb073da 14831->14832 14834 7ff63fb073e7 14831->14834 14839 7ff63fcd1b70 14832->14839 14833 7ff63fb07401 14845 7ff63fcd1b78 14833->14845 14834->14833 14841 7ff63fb2fbd0 14834->14841 14838 7ff63fb073e4 14838->14824 14839->14838 14840 7ff63fcd2d98 free 14839->14840 14842 7ff63fb2fc34 14841->14842 14843 7ff63fb2fc46 _invalid_parameter_noinfo_noreturn 14842->14843 14844 7ff63fb2fc59 14842->14844 14843->14842 14843->14843 14844->14833 14846 7ff63fcd1b70 14845->14846 14846->14838 14847 7ff63fcd2d98 free 14846->14847 14849 7ff63fcd2372 RtlLookupFunctionEntry 14848->14849 14850 7ff63fcd218b 14849->14850 14851 7ff63fcd2388 RtlVirtualUnwind 14849->14851 14852 7ff63fcd212c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14850->14852 14851->14849 14851->14850

                                Control-flow Graph

                                APIs
                                • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF63FB2FD43,?,?,?,?,?,?,?,?,?,00007FF63FB34340), ref: 00007FF63FCD1B4E
                                • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF63FCD1B64
                                  • Part of subcall function 00007FF63FCD2930: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF63FCD2939
                                  • Part of subcall function 00007FF63FCD2930: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF63FCD1B69,?,?,?,00007FF63FB2FD43), ref: 00007FF63FCD294A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::cancel_current_taskExceptionThrowmallocstd::bad_alloc::bad_alloc
                                • String ID:
                                • API String ID: 514126270-0
                                • Opcode ID: f8a4103838cfa4670266cde32cbc1b6d3760155078776d00e363d5b4da3d2167
                                • Instruction ID: ecde7bbd61b12b362fce67d96f70bbad71aa5805c9dc4e5925331f0e4c9befb0
                                • Opcode Fuzzy Hash: f8a4103838cfa4670266cde32cbc1b6d3760155078776d00e363d5b4da3d2167
                                • Instruction Fuzzy Hash: ABE0BD80EDA10B19FA2D2A6238160BE02600F58774E182B34F93D893C6BD1CA891A320

                                Control-flow Graph

                                APIs
                                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FB05B0C
                                  • Part of subcall function 00007FF63FB0C530: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF63FB0C5A6
                                  • Part of subcall function 00007FF63FB0C530: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF63FB0C5B5
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Concurrency::details::EmptyQueue::StructuredWork
                                • String ID:
                                • API String ID: 2595383736-0
                                • Opcode ID: 576b010e4d79c71d416d7fa9ea3cde484612d8b2d44409d99271f6b5ee5e5ba0
                                • Instruction ID: 9c6a5d50ed2474cc635b49ffd7c688073a2d855f8c5c88c5b2becb59774e6f05
                                • Opcode Fuzzy Hash: 576b010e4d79c71d416d7fa9ea3cde484612d8b2d44409d99271f6b5ee5e5ba0
                                • Instruction Fuzzy Hash: 01211276618F8982DA10DB15F48026AB7A4FBCAB84F501126FACE83B69DF3CD051DB00

                                Control-flow Graph

                                APIs
                                  • Part of subcall function 00007FF63FB33510: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00007FF63FB33519
                                  • Part of subcall function 00007FF63FB33510: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF63FB04A38), ref: 00007FF63FB3352A
                                • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00007FF63FB04772), ref: 00007FF63FB04A52
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: ExceptionThrow_invalid_parameter_noinfo_noreturnstdext::threads::lock_error::lock_error
                                • String ID:
                                • API String ID: 2622805724-0
                                • Opcode ID: 6374f793fb6f722ee5878ab83d7be588fd6d591f92a24dbc7afee8e052767654
                                • Instruction ID: 881315bc1fd99f0223f27c037708d47094fb67c23c0f5036a83e304a8acaeec2
                                • Opcode Fuzzy Hash: 6374f793fb6f722ee5878ab83d7be588fd6d591f92a24dbc7afee8e052767654
                                • Instruction Fuzzy Hash: 470192A2A18F4281DA649B19E44071BA3A0FB897A8F101631F6DE83794EF7CC0109B05

                                Control-flow Graph

                                APIs
                                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FB2FEF3
                                  • Part of subcall function 00007FF63FB04790: allocator.LIBCONCRTD ref: 00007FF63FB047AB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::details::EmptyQueue::StructuredWorkallocator
                                • String ID:
                                • API String ID: 1755220593-0
                                • Opcode ID: b78befe849ce56f157e027da90f8e68232d6b693ab0334466e71ee11ad11378e
                                • Instruction ID: 3a9a0917b70f8ab91a77983b72bec9ebf3c453bc8c577bc6f071dc0c337c7220
                                • Opcode Fuzzy Hash: b78befe849ce56f157e027da90f8e68232d6b693ab0334466e71ee11ad11378e
                                • Instruction Fuzzy Hash: E2016076619F8482CA60DB0AF89011EB7A4F7C9B94F504126FACE83B29DF3CD1608B00

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 55 7ff63fb04790-7ff63fb047ab call 7ff63fb34320 57 7ff63fb047b0-7ff63fb047b4 55->57
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: allocator
                                • String ID:
                                • API String ID: 3447690668-0
                                • Opcode ID: c46cd13c757347ee5ae45a1ac98d4f5a8e92b1abd091d4f9b2d6aefa4f4cafc4
                                • Instruction ID: 515e6974a6f2a974961eaf901cdecbec829d458b54a58c36d3b1a361faba049a
                                • Opcode Fuzzy Hash: c46cd13c757347ee5ae45a1ac98d4f5a8e92b1abd091d4f9b2d6aefa4f4cafc4
                                • Instruction Fuzzy Hash: 1EC0C9A6A29B84C1CA04EB12F88100A7360F7C8BC0F909421EA8E43729CF38C0548B00
                                APIs
                                Strings
                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF63FCD1ADB
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: CriticalInitializeSection$DebugDebuggerErrorLastOutputPresentString__vcrt_
                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                • API String ID: 3055932891-631824599
                                • Opcode ID: 783119a43e65aac90d12e51b1c615accf096e0dfaa7eb4c44b9032a0703a7d66
                                • Instruction ID: c2ab02708994718866372e4ee9c9cb6f06ef415f3ce9197f671f7a76010ef17a
                                • Opcode Fuzzy Hash: 783119a43e65aac90d12e51b1c615accf096e0dfaa7eb4c44b9032a0703a7d66
                                • Instruction Fuzzy Hash: A9112832B54B82A6E7489B22E6543AA33A4FF44345F444135D65D82AA4EF3CE464D750
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                • String ID:
                                • API String ID: 2933794660-0
                                • Opcode ID: 4e2d1bd58a9d8448902597674e7da3e3367d4cfbcb8d42016aa474c77cdf1e72
                                • Instruction ID: ae5c9fdbf776cb774ce558c6ccdb7806c5c0ca06fb34145a7a07a651d66a8b29
                                • Opcode Fuzzy Hash: 4e2d1bd58a9d8448902597674e7da3e3367d4cfbcb8d42016aa474c77cdf1e72
                                • Instruction Fuzzy Hash: C8112A26B94F068AEB00CF60E8542B933B4FB59758F441E31EA6D867A4DF7CD558D380
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: FormatInfoLocaleMessage
                                • String ID: !x-sys-default-locale
                                • API String ID: 4235545615-2729719199
                                • Opcode ID: ae7cb96a73b823519f046e9a82413b3af816002884d7848d87413d8fa98ec08b
                                • Instruction ID: 63c86024d24c3c7a079b94a51e4075f826db81af29baa440fc81144030329e1c
                                • Opcode Fuzzy Hash: ae7cb96a73b823519f046e9a82413b3af816002884d7848d87413d8fa98ec08b
                                • Instruction Fuzzy Hash: 8901CC72B88B8282F7198B52B500BBFA7B1FB887C4F048135EA4986B98CF3CD500D740
                                APIs
                                  • Part of subcall function 00007FF63FCD1E70: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF63FB2EF0E,?,?,?,?,00007FF63FB181DE,?,?,?,?,00007FF63F9F1050), ref: 00007FF63FCD1E80
                                • GetProcessHeap.KERNEL32(?,?,?,?,00007FF63FB181DE,?,?,?,?,00007FF63F9F1050), ref: 00007FF63FB2EEAF
                                  • Part of subcall function 00007FF63FCD1E04: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF63FB2EF53,?,?,?,?,00007FF63FB181DE,?,?,?,?,00007FF63F9F1050), ref: 00007FF63FCD1E14
                                  • Part of subcall function 00007FF63FCD1E04: ReleaseSRWLockExclusive.KERNEL32(?,?,?,00007FF63FB2EF53,?,?,?,?,00007FF63FB181DE,?,?,?,?,00007FF63F9F1050), ref: 00007FF63FCD1E54
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: ExclusiveLock$Acquire$HeapProcessRelease
                                • String ID:
                                • API String ID: 3865638231-0
                                • Opcode ID: 71a3de95a5db07dcad1cd2507a2d500c210894f8145dd710bfa4608815be444e
                                • Instruction ID: 6e599e30e1bfd2b7651a56bf39757ef1a8ff5b2a9b26d1f661f9dcbe54cda19f
                                • Opcode Fuzzy Hash: 71a3de95a5db07dcad1cd2507a2d500c210894f8145dd710bfa4608815be444e
                                • Instruction Fuzzy Hash: BE21EC64A69943A5FA08EB14E9950B93375BF95740FC12332E40EC27E2DF2CEA55E341
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 741ea51273af6ced77d8204fa0c22d04b1cf6953300260873340e5f8a9195d54
                                • Instruction ID: 0c3733f3933f510445dd104ecacc71e8ad0557854efb709bc08535f33ca73713
                                • Opcode Fuzzy Hash: 741ea51273af6ced77d8204fa0c22d04b1cf6953300260873340e5f8a9195d54
                                • Instruction Fuzzy Hash: 21829176219AC58AD775CB19E4907AEB7A1F3C9B94F144126EA8E83B68CF3CD544CF00

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 109 7ff63fb0a5d0-7ff63fb0a629 ?width@ios_base@std@@QEBA_JXZ 110 7ff63fb0a65b-7ff63fb0a664 109->110 111 7ff63fb0a62b-7ff63fb0a659 ?width@ios_base@std@@QEBA_JXZ 109->111 113 7ff63fb0a699-7ff63fb0a6c1 call 7ff63fb190e0 call 7ff63fb1b300 110->113 111->110 112 7ff63fb0a666-7ff63fb0a694 ?width@ios_base@std@@QEBA_JXZ 111->112 112->113 118 7ff63fb0a6d3-7ff63fb0a701 ?flags@ios_base@std@@QEBAHXZ 113->118 119 7ff63fb0a6c3-7ff63fb0a6ce 113->119 121 7ff63fb0a707 118->121 122 7ff63fb0a7c2-7ff63fb0a7c7 118->122 120 7ff63fb0a920-7ff63fb0a991 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z call 7ff63fb1a290 call 7ff63fcd20e0 119->120 123 7ff63fb0a716-7ff63fb0a71c 121->123 125 7ff63fb0a7c9-7ff63fb0a821 ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z 122->125 126 7ff63fb0a833 122->126 123->122 127 7ff63fb0a722-7ff63fb0a7ae ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z call 7ff63fb68ab0 call 7ff63fb68b00 123->127 125->126 129 7ff63fb0a823-7ff63fb0a82e 125->129 130 7ff63fb0a842-7ff63fb0a848 126->130 143 7ff63fb0a7bd 127->143 144 7ff63fb0a7b0-7ff63fb0a7bb 127->144 133 7ff63fb0a8ee-7ff63fb0a91e ?width@ios_base@std@@QEAA_J_J@Z 129->133 130->133 134 7ff63fb0a84e-7ff63fb0a8da ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z call 7ff63fb68ab0 call 7ff63fb68b00 130->134 133->120 145 7ff63fb0a8e9 134->145 146 7ff63fb0a8dc-7ff63fb0a8e7 134->146 143->123 144->122 145->130 146->133
                                APIs
                                • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF63FB0A620
                                • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF63FB0A64B
                                • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF63FB0A686
                                • ?flags@ios_base@std@@QEBAHXZ.MSVCP140 ref: 00007FF63FB0A6F3
                                • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF63FB0A742
                                • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ.MSVCP140 ref: 00007FF63FB0A76D
                                • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF63FB0A781
                                • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF63FB0A7E9
                                • ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z.MSVCP140 ref: 00007FF63FB0A809
                                • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF63FB0A86E
                                • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ.MSVCP140 ref: 00007FF63FB0A899
                                • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF63FB0A8AD
                                • ?width@ios_base@std@@QEAA_J_J@Z.MSVCP140 ref: 00007FF63FB0A917
                                • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF63FB0A94E
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: U?$char_traits@_$D@std@@@std@@U?$char_traits@$?width@ios_base@std@@W@std@@@std@@$?rdbuf@?$basic_ios@_V?$basic_streambuf@_W@std@@@2@$?fill@?$basic_ios@?sputc@?$basic_streambuf@$?flags@ios_base@std@@?setstate@?$basic_ios@?sputn@?$basic_streambuf@_
                                • String ID:
                                • API String ID: 3628490770-0
                                • Opcode ID: 9f70a5b17ca0f15cc1049185e283ac8fd5907c399e60a8d025d402138028276d
                                • Instruction ID: 84f75ed986e1c18bd9f2c975ec51bdbb67a49003326dd801ec909f4416494e55
                                • Opcode Fuzzy Hash: 9f70a5b17ca0f15cc1049185e283ac8fd5907c399e60a8d025d402138028276d
                                • Instruction Fuzzy Hash: 63A1C766A0DB85C6DA64DB16F59036EB7A0FBC9B84F004436EA8E83769DF3CD4449B01

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: type_info::_name_internal_method$char_traits$Concurrency::details::EmptyQueue::StructuredWork
                                • String ID: ; expected $; last read: '$syntax error $unexpected $while parsing
                                • API String ID: 3012117132-4239264347
                                • Opcode ID: a5dc54af2d110ee15b9334c1b336f1c85abe22bcc17acc6ed72fc8297cf45f24
                                • Instruction ID: 2ef3e658429e2d8b2320aa4bef5e6ea45efb8ab67036d12a49c2476adc6e6209
                                • Opcode Fuzzy Hash: a5dc54af2d110ee15b9334c1b336f1c85abe22bcc17acc6ed72fc8297cf45f24
                                • Instruction Fuzzy Hash: 7B91E67264DBC691DAB49B14E4843EEB3A4FBC5780F404136E68E83BAADF2CD445DB40

                                Control-flow Graph

                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: type_info::_name_internal_method$ApisConcurrency::details::Concurrency::task_continuation_context::task_continuation_contextEmptyFac_nodeFac_node::_FileListQueue::StructuredWork___lc_codepage_func__std_fs_code_pagestd::_
                                • String ID: ", "$: "
                                • API String ID: 1700522703-747220369
                                • Opcode ID: 7cfcadc2253ab10c95d59581eebc5d8042cdd7e241ff29f6e7fafbed051b3339
                                • Instruction ID: 1db01740ed53cb064890a63e1f5f71daf4ae06d4f09953d3768d6c20d929126d
                                • Opcode Fuzzy Hash: 7cfcadc2253ab10c95d59581eebc5d8042cdd7e241ff29f6e7fafbed051b3339
                                • Instruction Fuzzy Hash: 1A612E7261CA8691DA35DB11E8513EFA360FBC9784F400532EA8EC3BAADE7CD505DB40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Func_class
                                • String ID: array$object$object key$object separator$value
                                • API String ID: 1670654298-2448007618
                                • Opcode ID: db5e975a570036553e7f94d44da9c56933bdf259cb22937827a301dce5654bd8
                                • Instruction ID: 0720821650170ced6a711cca0298dedd8024f552b86e3edbf539be4f79b4056d
                                • Opcode Fuzzy Hash: db5e975a570036553e7f94d44da9c56933bdf259cb22937827a301dce5654bd8
                                • Instruction Fuzzy Hash: DB5217A660DBC195DAB49B15F4903EEB3A4EBC6784F400132E6CE87B6ADF2CD544DB01
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Func_class
                                • String ID: array$object$object key$object separator$value
                                • API String ID: 1670654298-2448007618
                                • Opcode ID: 30ffda3624d6424a67e43499c31331b4d80e8fde3fb8fef4d10a9750cdbf09ca
                                • Instruction ID: ac4f3790051996d3a85923899824ea36d8347d4dbd76806faf83d35213903b44
                                • Opcode Fuzzy Hash: 30ffda3624d6424a67e43499c31331b4d80e8fde3fb8fef4d10a9750cdbf09ca
                                • Instruction Fuzzy Hash: BD5217A660DBC195DAB49B15F4903EEB3A4EBC6784F400132E6CE87B6ADF2CD544DB01
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: _errno_invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 2959964966-0
                                • Opcode ID: dd6bd2d32ed0a4552d503deda97d75ee8b407b9f55deb67a79f7f18f5301eac7
                                • Instruction ID: 76143c851833cc15d94f0b1568c5abc1fa20ca8ed6d66af19e559452204dfdfa
                                • Opcode Fuzzy Hash: dd6bd2d32ed0a4552d503deda97d75ee8b407b9f55deb67a79f7f18f5301eac7
                                • Instruction Fuzzy Hash: 223108B588D646CAE7248F10F44436BB7B0FB84758F000135E689827A8CFBCD585EF15
                                APIs
                                • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF63FB19A72), ref: 00007FF63FB338FF
                                • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF63FB19A72), ref: 00007FF63FB3390F
                                • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF63FB19A72), ref: 00007FF63FB33921
                                • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF63FB19A72), ref: 00007FF63FB33931
                                • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF63FB19A72), ref: 00007FF63FB3394C
                                • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140(?,?,?,?,?,?,?,?,00007FF63FB19A72), ref: 00007FF63FB33981
                                • ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z.MSVCP140(?,?,?,?,?,?,?,?,00007FF63FB19A72), ref: 00007FF63FB33991
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: D@std@@@std@@U?$char_traits@$?eback@?$basic_streambuf@$?egptr@?$basic_streambuf@?epptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@?setp@?$basic_streambuf@D00@
                                • String ID:
                                • API String ID: 2626452370-0
                                • Opcode ID: 185698c16b04f3af74c471cbd5ae4026bdc4d43d4a3e66adb1fa6317d3853b89
                                • Instruction ID: 0bd6f4898e1f0a3cd950043aa4fd8b733755d1f4b435b3b3e31eb6681006cb94
                                • Opcode Fuzzy Hash: 185698c16b04f3af74c471cbd5ae4026bdc4d43d4a3e66adb1fa6317d3853b89
                                • Instruction Fuzzy Hash: 1421BC76A59A8582EA14DB56F85122FB3A0FBC9B94F140135EA8E83B68DF7CD404DB04
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Decorator::getTableTypebool_shared_ptr$Concurrency::details::EmptyQueue::StructuredWork
                                • String ID:
                                • API String ID: 2631667939-0
                                • Opcode ID: 6a7545cfe1b610ce745b30f18c353a4de252b4bffb2beafc8b9a099a3b72e1a9
                                • Instruction ID: e428c9300bffd2db1a6ed8d5bb6ece5497e7e28b2a1263a69cba3312dc53b88b
                                • Opcode Fuzzy Hash: 6a7545cfe1b610ce745b30f18c353a4de252b4bffb2beafc8b9a099a3b72e1a9
                                • Instruction Fuzzy Hash: 85D12F7260CAC690DA75DB15E4913EEA360FBDA780F404432E6CE87BAADF6CD544DB01
                                APIs
                                  • Part of subcall function 00007FF63FB19080: ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF63FB190BA
                                • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF63FB0FB3B
                                • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF63FB0FB44
                                • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF63FB0FBF8
                                • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF63FB0FC01
                                • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF63FB0FCAC
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_$?rdbuf@?$basic_ios@_V?$basic_streambuf@_W@std@@@2@W@std@@@std@@$?sbumpc@?$basic_streambuf@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@Ipfx@?$basic_istream@
                                • String ID:
                                • API String ID: 436491974-0
                                • Opcode ID: c49e1b7a0487597d69a27c8c4d730118aa05dbd207d796b72402560918768041
                                • Instruction ID: 32fc36a6714d0fe8209e2b8828ef5f7f0d209485fff700816b0b3c7f5f401302
                                • Opcode Fuzzy Hash: c49e1b7a0487597d69a27c8c4d730118aa05dbd207d796b72402560918768041
                                • Instruction Fuzzy Hash: 16512F72A0C68285DA74DB15F59126EB7A0FBC9B84F004135EACEC7B69DF7CE4059B01
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: _errno_invalid_parameter_noinfo
                                • String ID:
                                • API String ID: 2959964966-0
                                • Opcode ID: 33e67c687726017ec922af3165dd94ef506de64be0c18755618cffadda7841a0
                                • Instruction ID: 0451db777d33bf20e32fada713f5cbb5f48c561bcc3ea0220897eb2bfbb8a567
                                • Opcode Fuzzy Hash: 33e67c687726017ec922af3165dd94ef506de64be0c18755618cffadda7841a0
                                • Instruction Fuzzy Hash: C33118B694D74686E7648B14F44432BB7E0FB89758F100235F69A82BA8CF7CE485EF05
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Getcat@?$codecvt@GetfacetMbstatet@@@std@@V42@@Vfacet@locale@2@std::locale::_
                                • String ID:
                                • API String ID: 930135289-0
                                • Opcode ID: 60e422734b0b0876130bd5e3988b4cc4bf4b6618fe5ac51d24d2c6d2df6d8229
                                • Instruction ID: 1d647af1e3c45348a72435b6e887002a5670a16b52ea2fcdb11067557a8291a7
                                • Opcode Fuzzy Hash: 60e422734b0b0876130bd5e3988b4cc4bf4b6618fe5ac51d24d2c6d2df6d8229
                                • Instruction Fuzzy Hash: 04310A26A5DA4582DA149B15F88126FB370FBC9794F501232FA8E83BA9DF3CD541DB00
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_type_info::_name_internal_method
                                • String ID: <U+%.4X>
                                • API String ID: 1503085150-1919636860
                                • Opcode ID: d7689c8780e7e9517fd381439f4adfe240bb0a6583ab39670c4d4a601100ede1
                                • Instruction ID: 3d62ed21d7f537f8cd87dcce5162e8f2c492bdd9388caced4eaa579a0a7093f3
                                • Opcode Fuzzy Hash: d7689c8780e7e9517fd381439f4adfe240bb0a6583ab39670c4d4a601100ede1
                                • Instruction Fuzzy Hash: 8831597261CA8186D664DB11F85126FB7A0FBC9780F504532FACEC7B6ADE2CD580DB40
                                APIs
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::cancellation_token::_FromImpl
                                • String ID: at line $, column
                                • API String ID: 2278334151-191570568
                                • Opcode ID: 0b0476e683444410c06c89faf219409f412737b45ccb73666e32d8119b3c7eb2
                                • Instruction ID: 76f98726976b9cbcafbba68471dc082d2a8b367ab05104cefc292c7e39caa98a
                                • Opcode Fuzzy Hash: 0b0476e683444410c06c89faf219409f412737b45ccb73666e32d8119b3c7eb2
                                • Instruction Fuzzy Hash: 1931E372509B8582DA64DB59F88139BB7A4F7C9780F004126EACE83B69DF3CD545CB40
                                APIs
                                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FB16DC4
                                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FB16F85
                                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FB16F9A
                                  • Part of subcall function 00007FF63FBCCDD0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FBCCDED
                                  • Part of subcall function 00007FF63FBCCDD0: _Max_value.LIBCPMTD ref: 00007FF63FBCCE12
                                  • Part of subcall function 00007FF63FBCCDD0: _Min_value.LIBCPMTD ref: 00007FF63FBCCE40
                                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FB170DC
                                  • Part of subcall function 00007FF63FB34180: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF63FB050B5), ref: 00007FF63FB3418B
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_valueXlength_error@std@@
                                • String ID:
                                • API String ID: 4007518583-0
                                • Opcode ID: 0f077840f1ac01a53fb5d9f445c245d8c4bb494e84aab70f3904c119a19f714d
                                • Instruction ID: 8762115fea90ba0f26d5459cc6c7b74a614ff12d04dbef062167225bcdfe6f02
                                • Opcode Fuzzy Hash: 0f077840f1ac01a53fb5d9f445c245d8c4bb494e84aab70f3904c119a19f714d
                                • Instruction Fuzzy Hash: FAB1F86661DBC585DA64DB16E8503ABB7A0FBC9BC0F004136EACE83B69DF6CD4409B41
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: ByteCharMultiWide$ErrorLast
                                • String ID:
                                • API String ID: 1717984340-0
                                • Opcode ID: ecec202655f9c531599374b38fcc20988f0c2ce1ba8e6c9c4af8467a9ed67bab
                                • Instruction ID: d4a2b672f0af4406529839e11aae11c6c277c805126a1fb8c92cd2b46d421629
                                • Opcode Fuzzy Hash: ecec202655f9c531599374b38fcc20988f0c2ce1ba8e6c9c4af8467a9ed67bab
                                • Instruction Fuzzy Hash: 8A51E372618A818AD364CF15F48075EBBB0F78AB94F604125EACE87BA8DF7DD4448F40
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: __std_fs_convert_wide_to_narrow$Concurrency::details::EmptyExceptionListQueue::StructuredThrowWorkstd::make_error_code
                                • String ID:
                                • API String ID: 473158611-0
                                • Opcode ID: 8c4fd6d1689670e3fa4bf0a2fbe0c1002703dfa7d8f897caa6212ac84a87bdcc
                                • Instruction ID: 3813e0d70cf04e3c8985f8df49bb554406c2bd8c516354f03dad1dd5a8f1536e
                                • Opcode Fuzzy Hash: 8c4fd6d1689670e3fa4bf0a2fbe0c1002703dfa7d8f897caa6212ac84a87bdcc
                                • Instruction Fuzzy Hash: C131D672A19A818AD6A4DB25E84176FB7A0FBC5780F105136FACE87B5ACF3CD4049B40
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: __std_fs_convert_narrow_to_wide$Concurrency::details::EmptyExceptionListQueue::StructuredThrowWorkstd::make_error_code
                                • String ID:
                                • API String ID: 3467093758-0
                                • Opcode ID: f1c37221971197ef2e6fe997a5e6e49ba08a93edbf11d59a9802932ff8400463
                                • Instruction ID: 68ef8d5b12736b66f27cb8c896c739a2b35e1fb402c43f9be075961d3777e51e
                                • Opcode Fuzzy Hash: f1c37221971197ef2e6fe997a5e6e49ba08a93edbf11d59a9802932ff8400463
                                • Instruction Fuzzy Hash: 1131FA725196818AD664EB15E84176FB7A0FBC5780F001136F6CE83B5ACF3CD4009F40
                                APIs
                                  • Part of subcall function 00007FF63FB18390: ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140(?,?,?,?,?,?,00007FF63FB190FD), ref: 00007FF63FB183D2
                                • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF63FB19118
                                • ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ.MSVCP140 ref: 00007FF63FB1914A
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: U?$char_traits@U?$char_traits@_$?good@ios_base@std@@?rdbuf@?$basic_ios@_?tie@?$basic_ios@D@std@@@2@D@std@@@std@@V?$basic_ostream@V?$basic_streambuf@_W@std@@@2@W@std@@@std@@
                                • String ID:
                                • API String ID: 770597929-0
                                • Opcode ID: 258c187f890d08a1e9fc0ca30172c85fc87cdba7641fff0cb397c093e47e2444
                                • Instruction ID: e6d0b661a43fffcc369838b081a3cb7a4cddf806fa17c7fa0a9e17efb996f318
                                • Opcode Fuzzy Hash: 258c187f890d08a1e9fc0ca30172c85fc87cdba7641fff0cb397c093e47e2444
                                • Instruction Fuzzy Hash: BE21AA26609B8581DB14CB1AE49422EBBB0FBCAB89F544026EB8E83774DF3DD550D701
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: ByteCharErrorLastMultiWide
                                • String ID:
                                • API String ID: 203985260-0
                                • Opcode ID: e49e580475eb105ab438402875f7e769b0585cb18dcc6b3ad0ebc97820afbe23
                                • Instruction ID: 1d90202153fa69133e053c85176e690e562008e9156af392b39be2fd0570875a
                                • Opcode Fuzzy Hash: e49e580475eb105ab438402875f7e769b0585cb18dcc6b3ad0ebc97820afbe23
                                • Instruction Fuzzy Hash: 4C21F976A58B8586E7148F11A44432FB7B4FB99B84F544139EB8993B64DF3CD4018B44
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Func_class
                                • String ID:
                                • API String ID: 1670654298-0
                                • Opcode ID: e77f79d9cf39988b35128cb69f5d17508d7ad36d8d49692ac75ebe8530a279bd
                                • Instruction ID: b6df9eb4e294f3c6178c075965b2016056d2d43544b33a9531b4f069d693186b
                                • Opcode Fuzzy Hash: e77f79d9cf39988b35128cb69f5d17508d7ad36d8d49692ac75ebe8530a279bd
                                • Instruction Fuzzy Hash: F411FEA2A4CA4182DA14EB16EC5112FA7A4FBC6BC0F544036EACEC777ADE2DD4419B01
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: shared_ptr$allocator
                                • String ID:
                                • API String ID: 426846764-0
                                • Opcode ID: fe7b6fd1f7e30fa00660d5006c6cb6fedca7224268ee6b27a83a09b9491fca5c
                                • Instruction ID: 751b365ba583917891976fa2e6784c96fadda950eaff2d0af9fc2a30039c7408
                                • Opcode Fuzzy Hash: fe7b6fd1f7e30fa00660d5006c6cb6fedca7224268ee6b27a83a09b9491fca5c
                                • Instruction Fuzzy Hash: 4711576260CA8281DA70EB15F4412AFB365FBC97C0F408131EACE87B5ADF3CD1519B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Find_uncheckedHandle
                                • String ID:
                                • API String ID: 1005945929-0
                                • Opcode ID: eec8d121c8286cafcff43c719952123da7a1a0ff476df82a5753a9bbffeecc93
                                • Instruction ID: 49fe2409377b06b28411bc2f378d15df74633b6069153f64b73aaf38851348bd
                                • Opcode Fuzzy Hash: eec8d121c8286cafcff43c719952123da7a1a0ff476df82a5753a9bbffeecc93
                                • Instruction Fuzzy Hash: B0F04BA2A1CA8281DA54EB11F85106FA3A0FBC97D0F001435F6CFC3B6ADFACD0009B00
                                APIs
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Find_uncheckedHandle
                                • String ID:
                                • API String ID: 1005945929-0
                                • Opcode ID: 291345dabd49c7083a4d0a6fd68b288ae2a2360adec0d06b4a22fb5c96f750aa
                                • Instruction ID: 34c61d98efa3fcd7b250a1bc41742d90102629d86e55bb41d7bf008f0f3661ba
                                • Opcode Fuzzy Hash: 291345dabd49c7083a4d0a6fd68b288ae2a2360adec0d06b4a22fb5c96f750aa
                                • Instruction Fuzzy Hash: E5F028A261DA8281DA54EB11F85106BA7A0FBC97D0F001031FACFC3B6ADFACD0009B40
                                APIs
                                • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF63FB0AB78
                                • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF63FB0AB87
                                • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF63FB0AB96
                                • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF63FB0EF75), ref: 00007FF63FB0ABBD
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$memcmp
                                • String ID:
                                • API String ID: 2606901649-0
                                • Opcode ID: 694c53b12d12f6eba441c196b00874dfc9c15d4e7ec539bb03d53240b683f1a5
                                • Instruction ID: c16bda2e28e04fdf788021127ff7b3b606c843dce80f761018981746179989c9
                                • Opcode Fuzzy Hash: 694c53b12d12f6eba441c196b00874dfc9c15d4e7ec539bb03d53240b683f1a5
                                • Instruction Fuzzy Hash: 4BF0F472618B8581CA14EB11F8910ABB3A0FBD83C4F404535FACE82B6ADFBCC210CB40
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID: object key$object separator
                                • API String ID: 0-2279923633
                                • Opcode ID: a8f2c7678eb8f3b54bc150a978054d1c7856fc2a79208d43f394fedce2280f94
                                • Instruction ID: fd5bd99da5bc35d20844a0ab0ecae97dac89834818c4bbe96474514048b93494
                                • Opcode Fuzzy Hash: a8f2c7678eb8f3b54bc150a978054d1c7856fc2a79208d43f394fedce2280f94
                                • Instruction Fuzzy Hash: 9CC10AA260DAC194DA74AB15F4903EFB3A0EBC6784F400132E6CE87B9ADF2CD545DB41
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID:
                                • String ID: object key$object separator
                                • API String ID: 0-2279923633
                                • Opcode ID: 1e970a03f6bfa36e8a92cf90c08ce7a5caa9367753a1c01c580f077706461c82
                                • Instruction ID: 0aaa7c2af14458e3b72c1745aed8de4343823016d3089827baca465b44fa5244
                                • Opcode Fuzzy Hash: 1e970a03f6bfa36e8a92cf90c08ce7a5caa9367753a1c01c580f077706461c82
                                • Instruction Fuzzy Hash: 39C10BA260DAC1D4DA74AB15E4913EFB3A0EBC6784F404132E6CE87B9ADF2CD544DB41
                                APIs
                                  • Part of subcall function 00007FF63FBCEB00: Concurrency::cancellation_token::_FromImpl.LIBCPMTD ref: 00007FF63FBCEB2D
                                  • Part of subcall function 00007FF63FBCEB00: Concurrency::cancellation_token::_FromImpl.LIBCPMTD ref: 00007FF63FBCEB65
                                  • Part of subcall function 00007FF63FB16CD0: char_traits.LIBCPMTD ref: 00007FF63FB16CFD
                                • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF63FB3F930
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: Concurrency::cancellation_token::_FromImpl$Concurrency::details::EmptyQueue::StructuredWorkchar_traits
                                • String ID: parse error$parse_error
                                • API String ID: 3940763495-1820534363
                                • Opcode ID: 225d94126315b9ff481c257670acb08f044ef1bb55069bb0d9d9c434ea7b6b3d
                                • Instruction ID: 4eeca924edc88d49205af5225a904303069cdd0cc142beb3ce9ffc7ce6d64f4d
                                • Opcode Fuzzy Hash: 225d94126315b9ff481c257670acb08f044ef1bb55069bb0d9d9c434ea7b6b3d
                                • Instruction Fuzzy Hash: 7551E376609AC691DAA09B15F4903DBB7A4FBC5384F404122EACE83B6ADF3CD545DB40
                                APIs
                                • ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z.MSVCP140 ref: 00007FF63FB30EF1
                                • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF63FB30F60
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1546323219.00007FF63F9F1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF63F9F0000, based on PE: true
                                • Associated: 00000000.00000002.1546304615.00007FF63F9F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546585956.00007FF63FCD8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546655499.00007FF63FD8A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1546673307.00007FF63FD8C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ff63f9f0000_SecuriteInfo.jbxd
                                Similarity
                                • API ID: ?unshift@?$codecvt@Mbstatet@@Mbstatet@@@std@@fwrite
                                • String ID:
                                • API String ID: 1347553915-3916222277
                                • Opcode ID: 94081bf84289e140f870bed1d50639b63d428586c365cbc78b24cb85a2ac98e2
                                • Instruction ID: 1fe5415d88affd97d8d67726e2340b0cc2b5d6edfbb7bfd3bd1c260914c89fdf
                                • Opcode Fuzzy Hash: 94081bf84289e140f870bed1d50639b63d428586c365cbc78b24cb85a2ac98e2
                                • Instruction Fuzzy Hash: 63410B76A5C78186DB64DB15E4543AAB7A1FBC6784F101036EACE83BA8CF3CD444EB41