Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Analysis ID:1542454
MD5:a57dad8c1dae1fa551709713fa74bbee
SHA1:42bc8573f4eb0a5e1ee83b7bce5dcc952526cb88
SHA256:3744aed5783f8ffd6dff8d8beb8bfccf8abd1320bc86f58d281f29bc58695ec0
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe (PID: 3012 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5: A57DAD8C1DAE1FA551709713FA74BBEE)
    • conhost.exe (PID: 3060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 5640 cmdline: C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • certutil.exe (PID: 3148 cmdline: certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 MD5: F17616EC0522FC5633151F7CAA278CAA)
      • find.exe (PID: 5892 cmdline: find /i /v "md5" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
      • find.exe (PID: 3008 cmdline: find /i /v "certutil" MD5: 4BF76A28D31FC73AA9FC970B22D056AF)
    • cmd.exe (PID: 6588 cmdline: C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • cmd.exe (PID: 6284 cmdline: cmd /C "color b && title Error && echo SSL connect error && timeout /t 5" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 2876 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • timeout.exe (PID: 4028 cmdline: timeout /t 5 MD5: 100065E21CFBBDE57CBA2838921F84D6)
    • WerFault.exe (PID: 6788 cmdline: C:\Windows\system32\WerFault.exe -u -p 3012 -s 424 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeReversingLabs: Detection: 23%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.0% probability
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeJoe Sandbox ML: detected
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_d5f26adc-f
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: d:\ied_sec_client_proj\trunk\tessafe\Bin\amd64\TesSafe64.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: d:\sandbox\154167\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: C:\Users\gg\Desktop\projects\KernelVault\keyauth-cpp-library-main clix\DriverLoader2\DriverLoader2\x64\Release\DriverLoader2.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Joe Sandbox ViewIP Address: 104.26.0.5 104.26.0.5
Source: Joe Sandbox ViewJA3 fingerprint: ce5f3254611a8c095a3d821d44539877
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: keyauth.win
Source: Amcache.hve.13.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600192022.000001C0852DC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2599979839.000000B02718D000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600192022.000001C0852DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/acec
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600192022.000001C0852DC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://keyauth.win/api/1.2/og5f
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 104.26.0.5:443 -> 192.168.2.5:49708 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF7176D66800_2_00007FF7176D6680
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3012 -s 424
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTesSafe64.sys vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000000.2052537031.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000000.2052537031.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTesSafe64.sys vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary or memory string: OriginalFilenameiQVW64.SYSH vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary or memory string: OriginalFilenameTesSafe64.sys vs SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary string: TesSafe\Device\TesSafe\DosDevices\TesSafe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeBinary string: \Device\Nal
Source: classification engineClassification label: mal56.winEXE@18/5@1/2
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3060:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2876:120:WilError_03
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3012
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\020bfd90-bf78-41db-9ded-8bf77a89730fJump to behavior
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeReversingLabs: Detection: 23%
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectory
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 3012 -s 424
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeSection loaded: schannel.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cabinet.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptui.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntdsapi.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: version.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: secur32.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: certca.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Windows\System32\certutil.exeSection loaded: profapi.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: ulib.dllJump to behavior
Source: C:\Windows\System32\find.exeSection loaded: fsutilext.dllJump to behavior
Source: C:\Windows\System32\timeout.exeSection loaded: version.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic file information: File size 3873408 > 1048576
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2e6a00
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: d:\ied_sec_client_proj\trunk\tessafe\Bin\amd64\TesSafe64.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: d:\sandbox\154167\sdk\nal\src\winnt_wdm\driver\objfre_wnet_AMD64\amd64\iqvw64e.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: Binary string: C:\Users\gg\Desktop\projects\KernelVault\keyauth-cpp-library-main clix\DriverLoader2\DriverLoader2\x64\Release\DriverLoader2.pdb source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeAPI coverage: 0.7 %
Source: C:\Windows\System32\timeout.exe TID: 892Thread sleep count: 38 > 30Jump to behavior
Source: Amcache.hve.13.drBinary or memory string: VMware
Source: Amcache.hve.13.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.13.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.13.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.13.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.13.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.13.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.13.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.13.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.13.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.13.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.13.drBinary or memory string: vmci.sys
Source: Amcache.hve.13.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.13.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.13.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.13.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.13.drBinary or memory string: VMware20,1
Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.13.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.13.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.13.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.13.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.13.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.13.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.13.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.13.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.13.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600192022.000001C0852DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllXX
Source: Amcache.hve.13.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF7178A1A58 __vcrt_InitializeCriticalSectionEx,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7178A1A58
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF7178A1A58 __vcrt_InitializeCriticalSectionEx,GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF7178A1A58
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF7176FEE60 GetProcessHeap,0_2_00007FF7176FEE60
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF7178A212C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7178A212C
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\certutil.exe certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "md5" Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\find.exe find /i /v "certutil"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\cmd.exe cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"Jump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\timeout.exe timeout /t 5Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: GetLocaleInfoEx,FormatMessageA,0_2_00007FF7178A1278
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exeCode function: 0_2_00007FF7178A2BA0 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF7178A2BA0
Source: Amcache.hve.13.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.13.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.13.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.13.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
11
Process Injection
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1542454 Sample: SecuriteInfo.com.Variant.Te... Startdate: 25/10/2024 Architecture: WINDOWS Score: 56 32 keyauth.win 2->32 38 Multi AV Scanner detection for submitted file 2->38 40 Machine Learning detection for sample 2->40 42 AI detected suspicious sample 2->42 9 SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe 1 2->9         started        signatures3 process4 dnsIp5 34 keyauth.win 104.26.0.5, 443, 49708 CLOUDFLARENETUS United States 9->34 36 127.0.0.1 unknown unknown 9->36 12 cmd.exe 1 9->12         started        14 cmd.exe 1 9->14         started        16 WerFault.exe 19 16 9->16         started        18 conhost.exe 9->18         started        process6 process7 20 certutil.exe 3 1 12->20         started        22 find.exe 1 12->22         started        24 find.exe 1 12->24         started        26 cmd.exe 1 14->26         started        process8 28 conhost.exe 26->28         started        30 timeout.exe 1 26->30         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe24%ReversingLabs
SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
https://curl.haxx.se/docs/http-cookies.html0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
keyauth.win
104.26.0.5
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://keyauth.win/api/1.2/og5fSecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600192022.000001C0852DC000.00000004.00000020.00020000.00000000.sdmpfalse
      unknown
      https://keyauth.win/api/1.2/acecSecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600192022.000001C0852DC000.00000004.00000020.00020000.00000000.sdmpfalse
        unknown
        http://upx.sf.netAmcache.hve.13.drfalse
        • URL Reputation: safe
        unknown
        https://curl.haxx.se/docs/http-cookies.htmlSecuriteInfo.com.Variant.Tedy.627915.599.8749.exefalse
        • URL Reputation: safe
        unknown
        https://keyauth.win/api/1.2/SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2600192022.000001C0852DC000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe, 00000000.00000002.2599979839.000000B02718D000.00000004.00000010.00020000.00000000.sdmpfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          104.26.0.5
          keyauth.winUnited States
          13335CLOUDFLARENETUSfalse
          IP
          127.0.0.1
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1542454
          Start date and time:2024-10-25 23:48:31 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 6m 24s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Run with higher sleep bypass
          Number of analysed new started processes analysed:18
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
          Detection:MAL
          Classification:mal56.winEXE@18/5@1/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:Failed
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
          • Excluded IPs from analysis (whitelisted): 20.42.73.29
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • VT rate limit hit for: SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          104.26.0.5lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
            xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
              LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                  4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                    xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                      dGuXzI4UlT.exeGet hashmaliciousUnknownBrowse
                        vjlICWbvGT.exeGet hashmaliciousUnknownBrowse
                          SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            keyauth.winlUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            LDlanZur0i.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            Fa1QSXjTZD.exeGet hashmaliciousUnknownBrowse
                            • 104.26.1.5
                            xxImTScxAq.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            4aOgNkVU5z.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            xVmySfWfcW.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            dGuXzI4UlT.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            vjlICWbvGT.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSv2hvYA53Ys.exeGet hashmaliciousStealcBrowse
                            • 104.21.56.70
                            Zl5QaBwsTJ.exeGet hashmaliciousStealcBrowse
                            • 104.21.56.70
                            https://louisianalaw.us/awI1AlsoTxn2APQ3EspQ3E4RAI1AoTxnz01coTxm&c=E,1,vvMSQz5CSzvUF_pnZgRSmb_4_6IhFVsFaIdJFKN2k78xDXcVLKO_NH-275AIvCQYfKD3jL3qc4bCIgEC2N6Rr4xli-ez6GBrwxbUrVz5hy4g&typo=1Get hashmaliciousUnknownBrowse
                            • 188.114.96.3
                            https://certify.us.com/D5QkoQ3Eniw4G2APQ3ED5QpQ3E4RAionz01coq01Get hashmaliciousUnknownBrowse
                            • 188.114.97.3
                            Setup.exeGet hashmaliciousLummaC StealerBrowse
                            • 188.114.97.3
                            Setup.exeGet hashmaliciousLummaC StealerBrowse
                            • 188.114.97.3
                            setup.exeGet hashmaliciousLummaCBrowse
                            • 188.114.96.3
                            sgM0Akbldk.exeGet hashmaliciousStealcBrowse
                            • 172.67.179.207
                            5Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                            • 188.114.97.3
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ce5f3254611a8c095a3d821d44539877lUAc7lqa56.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.FileRepMalware.12632.12594.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.FileRepMalware.8628.17723.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.Win64.MalwareX-gen.29573.28124.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            Iyto7FYCJO.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.Win64.Evo-gen.20301.32747.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.Win64.MalwareX-gen.32411.29244.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            Frozen_Slotted.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            SecuriteInfo.com.Win64.TrojanX-gen.12317.30120.exeGet hashmaliciousUnknownBrowse
                            • 104.26.0.5
                            No context
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):65536
                            Entropy (8bit):0.9201048697253654
                            Encrypted:false
                            SSDEEP:96:jCFKF46ssChqtY7q4BSFQXIDcQlc6WcE8cw3d/x+HbHg/8BRTf3o8Fa9KUNsPQEy:jDG6sqV+07SmJ+jHOzuiFeZ24lO8U
                            MD5:099A2253FF86BCB911DE77324ABEF5EB
                            SHA1:2E7EF81608347DC0E6FB7F6C4FA93D152B592AAE
                            SHA-256:409BD710E113B97326C4D041E31ED76C01DE28B203308BAE8CDA702809CE9C4C
                            SHA-512:81254EA9923C7D4B870C61B37D9C818009DCD207A53CFB1739466549885C8D8A7B6716FDA6E1E580045484E169A18D40D70FCF11B63612A16A3EE653141F8188
                            Malicious:false
                            Reputation:low
                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.3.6.6.5.6.6.1.9.6.3.3.5.7.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.3.6.6.5.6.6.6.4.9.4.6.5.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.0.5.2.a.f.f.8.-.1.0.7.d.-.4.b.2.1.-.9.6.e.2.-.1.1.f.6.7.8.9.0.3.9.e.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.f.b.5.4.8.7.7.-.e.0.b.3.-.4.3.2.c.-.a.9.0.3.-.7.8.f.4.a.0.3.0.c.3.5.b.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.S.e.c.u.r.i.t.e.I.n.f.o...c.o.m...V.a.r.i.a.n.t...T.e.d.y...6.2.7.9.1.5...5.9.9...8.7.4.9...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.b.c.4.-.0.0.0.1.-.0.0.1.4.-.7.5.0.c.-.1.f.c.1.2.7.2.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.8.d.8.5.3.c.7.1.5.f.1.2.d.1.e.9.e.d.0.a.8.8.3.a.d.f.0.8.7.5.a.0.0.0.0.f.f.f.f.!.0.0.0.0.4.2.b.c.8.5.7.3.f.4.e.b.0.a.5.e.1.e.e.8.3.b.7.b.c.e.5.d.c.c.9.5.2.5.2.6.c.b.8.8.!.S.e.c.u.r.i.t.e.I.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:Mini DuMP crash report, 14 streams, Fri Oct 25 21:49:26 2024, 0x1205a4 type
                            Category:dropped
                            Size (bytes):158670
                            Entropy (8bit):1.5976030207549874
                            Encrypted:false
                            SSDEEP:192:rTnT8mZ3yUcpOlRvVUB05IEMxe0Ru+QOOC94:3nT8s3yUzlR2i5zMRzQmu
                            MD5:169F67D796631A0DCAFD7CEF132234B9
                            SHA1:9831F9BDB297BB0A37F515A7D89ED6B7B3876CE8
                            SHA-256:6DB569B0EB2EBB89FD04C40EA322F81240C1BCACFA4A691A960419070FF4118C
                            SHA-512:4235D82732E0CB6BD22D1EF36D6184D46CD82E0CB855EA8DBBD27EDAA22826B6ED80B026AC525B93B0F4B350B8B831A008CAD282FF244B0198517089C6D17826
                            Malicious:false
                            Preview:MDMP..a..... .......f..g....................................$....7..........T.......8...........T................Q......................................................................................................eJ......\.......Lw......................T...........c..g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):9022
                            Entropy (8bit):3.6997485529731486
                            Encrypted:false
                            SSDEEP:192:R6l7wVeJuKP61u6YEI6cytgmfp0DFpDy89bC+8fcWm:R6lXJ7P61u6YEFNtgmfp0/Cdf0
                            MD5:C96B3C7E9E494031AEBAA6095F94A314
                            SHA1:5152DE927551A7B97772B4C799E6DBBC2D0BD256
                            SHA-256:5223C3F9658D6EDF197AF9C25E1DC6F45D3F27F00BFC2B78AA924072DA55E9ED
                            SHA-512:C620FE11E89DCB34F700F668B5593E3CDEF76F49B361CEECBADC22FC854993EBFD925A9FBA641C0BB779EEB00B06A0B2E59490C49A51E6BC35BB2550A486C0D6
                            Malicious:false
                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.0.1.2.<./.P.i.
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                            Category:dropped
                            Size (bytes):5001
                            Entropy (8bit):4.544997033486
                            Encrypted:false
                            SSDEEP:96:uIjfTkI7UJ7VaJ/IA2Md3WQA2MqpY+oo+Id:uIvkYUJ7Y/IA2M9A2MqpY+T+2
                            MD5:1FD4E7FDBC3B2334A2296813A3151C09
                            SHA1:9FF95E866BEEF2907FD1B8A231E339F42CA22810
                            SHA-256:6CD954658E02A1797A7C400507E0D8276D425E9AB17C09AACEAD2F26608099A5
                            SHA-512:8F269F2058A1722BDA8EBEDFBA3692329994D9A81462423A98ED223F2AEF2AC9DD708F08D0F1128C71ADBB147B52EBC51B5018194A8BE8A347B51D64F009C914
                            Malicious:false
                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="559492" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                            Process:C:\Windows\System32\WerFault.exe
                            File Type:MS Windows registry file, NT/2000 or above
                            Category:dropped
                            Size (bytes):1835008
                            Entropy (8bit):4.421806827489751
                            Encrypted:false
                            SSDEEP:6144:4Svfpi6ceLP/9skLmb0OTZWSPHaJG8nAgeMZMMhA2fX4WABlEnN80uhiTw:DvloTZW+EZMM6DFyG03w
                            MD5:A3314DC3F41062523ED711E1B2CF6664
                            SHA1:B0707A80ECCB33B8618D4F36408C53FCBB09D36F
                            SHA-256:B14CB774851363ECEB4E1833F3F6E5A4DBA4B29A9A6BDC757FB504CC78EB4A15
                            SHA-512:990D0A8C13E266219AE5D637B019411350DEE4AE04C0A4915205A11DA5AD78B9CFC3D78D09FB20EA997BB32B36CC0C02406809B2CED039515E7DBE4DD39D4DF9
                            Malicious:false
                            Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.4..''.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                            File type:PE32+ executable (console) x86-64, for MS Windows
                            Entropy (8bit):6.317056142370199
                            TrID:
                            • Win64 Executable Console (202006/5) 92.65%
                            • Win64 Executable (generic) (12005/4) 5.51%
                            • Generic Win/DOS Executable (2004/3) 0.92%
                            • DOS Executable Generic (2002/1) 0.92%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
                            File size:3'873'408 bytes
                            MD5:a57dad8c1dae1fa551709713fa74bbee
                            SHA1:42bc8573f4eb0a5e1ee83b7bce5dcc952526cb88
                            SHA256:3744aed5783f8ffd6dff8d8beb8bfccf8abd1320bc86f58d281f29bc58695ec0
                            SHA512:49dfa57823633adcb1d4ff878136bc5dfbe357f526c4d5aa8f4e4f464ee6d34349a4df5e68aa4ed0de32d64c42f44488404bb0967e408df00ea39dfa6f1fc1b7
                            SSDEEP:49152:cCC5fA3V7/6Qqj2jsJRyhQ8jl4SAc6Li:c/VA/d5QSaL
                            TLSH:14066B065BEED0D8C070407821863217E6327C480A2ADBF71FD08B9667E776966BFF56
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2S..v2..v2..v2...J..`2....x.~2......r2......|2......S2......p2...B...2..=J..k2..v2...3..e...q2..e...t2..e.z.w2..e...w2..Richv2.
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x1402e262c
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x140000000
                            Subsystem:windows cui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                            DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66C54A5D [Wed Aug 21 02:01:01 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:6
                            OS Version Minor:0
                            File Version Major:6
                            File Version Minor:0
                            Subsystem Version Major:6
                            Subsystem Version Minor:0
                            Import Hash:5315b8464aa682f0e3d3b00df735a946
                            Instruction
                            dec eax
                            sub esp, 28h
                            call 00007F0BBC87B2F0h
                            dec eax
                            add esp, 28h
                            jmp 00007F0BBC87ABF7h
                            int3
                            int3
                            dec eax
                            mov dword ptr [esp+10h], ebx
                            dec eax
                            mov dword ptr [esp+18h], esi
                            push ebp
                            push edi
                            inc ecx
                            push esi
                            dec eax
                            mov ebp, esp
                            dec eax
                            sub esp, 10h
                            xor eax, eax
                            xor ecx, ecx
                            cpuid
                            inc esp
                            mov eax, ecx
                            inc esp
                            mov edx, edx
                            inc ecx
                            xor edx, 49656E69h
                            inc ecx
                            xor eax, 6C65746Eh
                            inc esp
                            mov ecx, ebx
                            inc esp
                            mov esi, eax
                            xor ecx, ecx
                            mov eax, 00000001h
                            cpuid
                            inc ebp
                            or edx, eax
                            mov dword ptr [ebp-10h], eax
                            inc ecx
                            xor ecx, 756E6547h
                            mov dword ptr [ebp-0Ch], ebx
                            inc ebp
                            or edx, ecx
                            mov dword ptr [ebp-08h], ecx
                            mov edi, ecx
                            mov dword ptr [ebp-04h], edx
                            jne 00007F0BBC87ADDDh
                            dec eax
                            or dword ptr [000B7A85h], FFFFFFFFh
                            and eax, 0FFF3FF0h
                            dec eax
                            mov dword ptr [000B7A6Dh], 00008000h
                            cmp eax, 000106C0h
                            je 00007F0BBC87ADAAh
                            cmp eax, 00020660h
                            je 00007F0BBC87ADA3h
                            cmp eax, 00020670h
                            je 00007F0BBC87AD9Ch
                            add eax, FFFCF9B0h
                            cmp eax, 20h
                            jnbe 00007F0BBC87ADA6h
                            dec eax
                            mov ecx, 00010001h
                            add dword ptr [eax], eax
                            add byte ptr [eax], al
                            dec eax
                            bt ecx, eax
                            jnc 00007F0BBC87AD96h
                            inc esp
                            mov eax, dword ptr [000B8D5Bh]
                            inc ecx
                            or eax, 01h
                            inc esp
                            mov dword ptr [000B8D50h], eax
                            Programming Language:
                            • [IMP] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3961400x21c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3a60000x1e0.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x39c0000x9abc.pdata
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x3a70000x600.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x32d2a00x70.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x32d3800x28.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x32d1600x140.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x2e80000xd78.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x2e68900x2e6a00249b1edcc5d16a058e72c3d76adff375unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x2e80000xb1e9e0xb20002243bfab32c6ece4826bbca0b59165afFalse0.4939239159058989data6.847170492622551IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x39a0000x14880xa00fc2b7bf89c934172bbfecdd94ba069e5False0.217578125data4.052491232704579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .pdata0x39c0000x9abc0x9c005929590dd1d4dbba8e1518d3f590e613False0.4462139423076923data5.977831928262313IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .rsrc0x3a60000x1e00x2006b3b1701e7ba0fd5f2721ec922bfab3fFalse0.52734375data4.70672250389512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x3a70000x6000x60004e47fa203d86d5e6d8e4bbe9c50c4d6False0.5904947916666666data5.362807738496344IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_MANIFEST0x3a60600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                            DLLImport
                            KERNEL32.dllLocalFree, GetModuleHandleW, GetModuleHandleA, GetModuleFileNameW, GetModuleFileNameA, InitializeSListHead, GetSystemTimeAsFileTime, IsProcessorFeaturePresent, TerminateProcess, UnhandledExceptionFilter, SleepConditionVariableSRW, WakeAllConditionVariable, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, IsDebuggerPresent, GetFileInformationByHandleEx, AreFileApisANSI, DeviceIoControl, GetFileAttributesExW, FindFirstFileW, FindClose, CreateDirectoryW, GetCurrentDirectoryW, GetLocaleInfoEx, GetFileSizeEx, CreateFileA, WaitForMultipleObjects, PeekNamedPipe, ReadFile, GetFileType, GetStdHandle, GetEnvironmentVariableA, MultiByteToWideChar, WaitForSingleObjectEx, MoveFileExA, GetTickCount, QueryPerformanceCounter, VerifyVersionInfoA, LoadLibraryA, FreeLibrary, QueryPerformanceFrequency, SleepEx, LeaveCriticalSection, EnterCriticalSection, FormatMessageA, SetLastError, WideCharToMultiByte, GetCurrentProcessId, GetCurrentThreadId, VirtualAlloc, VirtualFree, GetProcAddress, GetSystemDirectoryA, GetTempPathW, CreateFileW, SetUnhandledExceptionFilter, GetCurrentProcess, Sleep, DeleteCriticalSection, InitializeCriticalSectionEx, GetProcessHeap, HeapSize, HeapFree, HeapReAlloc, HeapAlloc, HeapDestroy, GetLastError, CloseHandle, OutputDebugStringW
                            USER32.dllMessageBoxA
                            ADVAPI32.dllCryptEncrypt, GetUserNameA, IsValidSid, GetTokenInformation, GetLengthSid, CopySid, OpenProcessToken, CryptCreateHash, CryptHashData, CryptDestroyHash, CryptDestroyKey, CryptImportKey, RegCloseKey, RegCreateKeyW, RegOpenKeyW, RegSetKeyValueW, RegDeleteTreeW, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptGenRandom, CloseServiceHandle, StartServiceA, OpenServiceA, OpenSCManagerA, DeleteService, CreateServiceA, ConvertSidToStringSidW
                            SHELL32.dllShellExecuteA
                            MSVCP140.dll?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ, ?fill@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WXZ, ?widen@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBA_WD@Z, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ?_Osfx@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAXXZ, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@_K@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@PEBX@Z, ?put@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@_W@Z, ?flush@?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV12@XZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEB_WHH@Z, ?wcout@std@@3V?$basic_ostream@_WU?$char_traits@_W@std@@@1@A, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@J@Z, ??6?$basic_ostream@_WU?$char_traits@_W@std@@@std@@QEAAAEAV01@K@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?widen@?$ctype@_W@std@@QEBA_WD@Z, ?_Getcat@?$ctype@_W@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?getloc@ios_base@std@@QEBA?AVlocale@2@XZ, ?id@?$ctype@_W@std@@2V0locale@2@A, ?_Xinvalid_argument@std@@YAXPEBD@Z, ?is@?$ctype@D@std@@QEBA_NFD@Z, ?_Getcat@?$ctype@D@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?rdstate@ios_base@std@@QEBAHXZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?id@?$ctype@D@std@@2V0locale@2@A, ?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAADD@Z, ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ, ?rdbuf@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_streambuf@DU?$char_traits@D@std@@@2@XZ, ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Pnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z, ?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?_Gnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?_Gninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?setstate@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEAAXH_N@Z, ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z, ?sputc@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAAG_W@Z, ??7ios_base@std@@QEBA_NXZ, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?_Unlock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?uflow@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?setbuf@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAPEAV12@PEAD_J@Z, ?sync@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAHXZ, ?imbue@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAAXAEBVlocale@2@@Z, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?setw@std@@YA?AU?$_Smanip@_J@1@_J@Z, ?_Xbad_function_call@std@@YAXXZ, ??1?$basic_iostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_iostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@@Z, ?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?snextc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?width@ios_base@std@@QEAA_J_J@Z, ?width@ios_base@std@@QEBA_JXZ, ?setf@ios_base@std@@QEAAHHH@Z, ?flags@ios_base@std@@QEBAHXZ, ?good@ios_base@std@@QEBA_NXZ, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z, ??Bid@locale@std@@QEAA_KXZ, ?tie@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_ostream@_WU?$char_traits@_W@std@@@2@XZ, ?_Winerror_map@std@@YAHH@Z, ?_Syserror_map@std@@YAPEBDH@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, ?uncaught_exceptions@std@@YAHXZ, ?_Xout_of_range@std@@YAXPEBD@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@H@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAVios_base@1@AEAV21@@Z@Z, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ?_Xlength_error@std@@YAXPEBD@Z, ??1_Lockit@std@@QEAA@XZ, ??0_Lockit@std@@QEAA@H@Z
                            Normaliz.dllIdnToAscii
                            WLDAP32.dll
                            CRYPT32.dllCertFreeCertificateChain, CertGetCertificateChain, CertFreeCertificateChainEngine, CertCreateCertificateChainEngine, CryptQueryObject, CertGetNameStringA, CertFindExtension, CertOpenStore, CryptDecodeObjectEx, PFXImportCertStore, CryptStringToBinaryA, CertFreeCertificateContext, CertFindCertificateInStore, CertEnumCertificatesInStore, CertCloseStore, CertAddCertificateContextToStore
                            WS2_32.dllWSAGetLastError, getpeername, recv, closesocket, bind, connect, getsockname, getsockopt, htons, ntohs, ntohl, socket, WSASetLastError, WSAIoctl, WSAStartup, select, WSACleanup, accept, gethostname, listen, ioctlsocket, __WSAFDIsSet, freeaddrinfo, getaddrinfo, recvfrom, send, sendto, setsockopt, htonl
                            SHLWAPI.dllPathFindFileNameW
                            RPCRT4.dllRpcStringFreeA, UuidToStringA, UuidCreate
                            USERENV.dllUnloadUserProfile
                            ntdll.dllRtlCaptureContext, VerSetConditionMask, RtlInitUnicodeString, NtQuerySystemInformation, RtlLookupFunctionEntry, RtlVirtualUnwind
                            VCRUNTIME140.dll__C_specific_handler, strrchr, __current_exception_context, memset, memcpy, strstr, __current_exception, _purecall, wcsstr, memmove, memcmp, memchr, __std_exception_copy, _CxxThrowException, strchr, __std_exception_destroy
                            VCRUNTIME140_1.dll__CxxFrameHandler4
                            api-ms-win-crt-runtime-l1-1-0.dll_c_exit, __p___argv, __p___argc, terminate, _set_app_type, _seh_filter_exe, system, _resetstkoflw, _configure_narrow_argv, _invalid_parameter_noinfo, _beginthreadex, _invalid_parameter_noinfo_noreturn, _exit, _cexit, _crt_atexit, exit, _initterm_e, _register_thread_local_exe_atexit_callback, abort, _initterm, _initialize_narrow_environment, strerror, _getpid, _register_onexit_function, __sys_nerr, _get_initial_narrow_environment, _errno, _initialize_onexit_table
                            api-ms-win-crt-heap-l1-1-0.dllfree, calloc, _recalloc, _callnewh, realloc, malloc, _set_new_mode
                            api-ms-win-crt-convert-l1-1-0.dllatoi, strtod, strtol, strtoul, strtoll, strtoull
                            api-ms-win-crt-environment-l1-1-0.dllgetenv
                            api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsscanf, __acrt_iob_func, fseek, _lseeki64, ftell, feof, fgets, _open, _close, _write, _get_stream_buffer_pointers, _read, __p__commode, fclose, fflush, fgetc, fgetpos, _set_fmode, __stdio_common_vsprintf, fopen, fputs, ungetc, setvbuf, _popen, _pclose, fwrite, _fseeki64, fsetpos, fread, fputc
                            api-ms-win-crt-filesystem-l1-1-0.dll_wremove, _stat64, remove, _lock_file, _fstat64, _access, _unlink, _unlock_file
                            api-ms-win-crt-time-l1-1-0.dll_localtime64, _gmtime64, strftime, _time64
                            api-ms-win-crt-locale-l1-1-0.dlllocaleconv, ___lc_codepage_func, _configthreadlocale
                            api-ms-win-crt-math-l1-1-0.dll__setusermatherr, _dsign, _dclass
                            api-ms-win-crt-string-l1-1-0.dllstrpbrk, strcmp, strcspn, _stricmp, strspn, isupper, strncpy, strncmp, tolower, _strdup
                            api-ms-win-crt-utility-l1-1-0.dllrand, qsort, srand
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 25, 2024 23:49:24.685077906 CEST49708443192.168.2.5104.26.0.5
                            Oct 25, 2024 23:49:24.685147047 CEST44349708104.26.0.5192.168.2.5
                            Oct 25, 2024 23:49:24.685219049 CEST49708443192.168.2.5104.26.0.5
                            Oct 25, 2024 23:49:24.695950985 CEST49708443192.168.2.5104.26.0.5
                            Oct 25, 2024 23:49:24.696017981 CEST44349708104.26.0.5192.168.2.5
                            Oct 25, 2024 23:49:25.320939064 CEST44349708104.26.0.5192.168.2.5
                            Oct 25, 2024 23:49:25.321214914 CEST49708443192.168.2.5104.26.0.5
                            Oct 25, 2024 23:49:26.350505114 CEST49708443192.168.2.5104.26.0.5
                            Oct 25, 2024 23:49:26.350552082 CEST44349708104.26.0.5192.168.2.5
                            Oct 25, 2024 23:49:26.350897074 CEST44349708104.26.0.5192.168.2.5
                            Oct 25, 2024 23:49:26.350931883 CEST49708443192.168.2.5104.26.0.5
                            Oct 25, 2024 23:49:26.350939989 CEST44349708104.26.0.5192.168.2.5
                            Oct 25, 2024 23:49:26.350981951 CEST49708443192.168.2.5104.26.0.5
                            TimestampSource PortDest PortSource IPDest IP
                            Oct 25, 2024 23:49:24.668593884 CEST5339653192.168.2.51.1.1.1
                            Oct 25, 2024 23:49:24.679630041 CEST53533961.1.1.1192.168.2.5
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Oct 25, 2024 23:49:24.668593884 CEST192.168.2.51.1.1.10xec00Standard query (0)keyauth.winA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Oct 25, 2024 23:49:24.679630041 CEST1.1.1.1192.168.2.50xec00No error (0)keyauth.win104.26.0.5A (IP address)IN (0x0001)false
                            Oct 25, 2024 23:49:24.679630041 CEST1.1.1.1192.168.2.50xec00No error (0)keyauth.win104.26.1.5A (IP address)IN (0x0001)false
                            Oct 25, 2024 23:49:24.679630041 CEST1.1.1.1192.168.2.50xec00No error (0)keyauth.win172.67.72.57A (IP address)IN (0x0001)false

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:17:49:23
                            Start date:25/10/2024
                            Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe
                            Wow64 process (32bit):false
                            Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe"
                            Imagebase:0x7ff7175c0000
                            File size:3'873'408 bytes
                            MD5 hash:A57DAD8C1DAE1FA551709713FA74BBEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:true

                            Target ID:1
                            Start time:17:49:23
                            Start date:25/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:2
                            Start time:17:49:23
                            Start date:25/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5 | find /i /v "md5" | find /i /v "certutil"
                            Imagebase:0x7ff63fc50000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:3
                            Start time:17:49:23
                            Start date:25/10/2024
                            Path:C:\Windows\System32\certutil.exe
                            Wow64 process (32bit):false
                            Commandline:certutil -hashfile "C:\Users\user\Desktop\SecuriteInfo.com.Variant.Tedy.627915.599.8749.exe" MD5
                            Imagebase:0x7ff6864d0000
                            File size:1'651'712 bytes
                            MD5 hash:F17616EC0522FC5633151F7CAA278CAA
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:4
                            Start time:17:49:23
                            Start date:25/10/2024
                            Path:C:\Windows\System32\find.exe
                            Wow64 process (32bit):false
                            Commandline:find /i /v "md5"
                            Imagebase:0x7ff7f8980000
                            File size:17'920 bytes
                            MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:5
                            Start time:17:49:23
                            Start date:25/10/2024
                            Path:C:\Windows\System32\find.exe
                            Wow64 process (32bit):false
                            Commandline:find /i /v "certutil"
                            Imagebase:0x7ff7f8980000
                            File size:17'920 bytes
                            MD5 hash:4BF76A28D31FC73AA9FC970B22D056AF
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:7
                            Start time:17:49:25
                            Start date:25/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                            Imagebase:0x7ff63fc50000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:8
                            Start time:17:49:25
                            Start date:25/10/2024
                            Path:C:\Windows\System32\cmd.exe
                            Wow64 process (32bit):false
                            Commandline:cmd /C "color b && title Error && echo SSL connect error && timeout /t 5"
                            Imagebase:0x7ff63fc50000
                            File size:289'792 bytes
                            MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:9
                            Start time:17:49:25
                            Start date:25/10/2024
                            Path:C:\Windows\System32\conhost.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                            Imagebase:0x7ff6d64d0000
                            File size:862'208 bytes
                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Target ID:12
                            Start time:17:49:25
                            Start date:25/10/2024
                            Path:C:\Windows\System32\timeout.exe
                            Wow64 process (32bit):false
                            Commandline:timeout /t 5
                            Imagebase:0x7ff6c5410000
                            File size:32'768 bytes
                            MD5 hash:100065E21CFBBDE57CBA2838921F84D6
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:moderate
                            Has exited:true

                            Target ID:13
                            Start time:17:49:26
                            Start date:25/10/2024
                            Path:C:\Windows\System32\WerFault.exe
                            Wow64 process (32bit):false
                            Commandline:C:\Windows\system32\WerFault.exe -u -p 3012 -s 424
                            Imagebase:0x7ff78e9f0000
                            File size:570'736 bytes
                            MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:high
                            Has exited:true

                            Reset < >

                              Execution Graph

                              Execution Coverage:0.4%
                              Dynamic/Decrypted Code Coverage:0%
                              Signature Coverage:1.3%
                              Total number of Nodes:77
                              Total number of Limit Nodes:4
                              execution_graph 14740 7ff7177f9940 14741 7ff7177f9971 HandleT type_info::_name_internal_method 14740->14741 14744 7ff7176d5ae0 14741->14744 14745 7ff7176d5b11 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::cancellation_token::_FromImpl 14744->14745 14747 7ff7176d5ba0 Concurrency::task_continuation_context::task_continuation_context 14745->14747 14754 7ff7176ffe30 14745->14754 14766 7ff7178a20e0 14747->14766 14755 7ff7176ffe48 14754->14755 14775 7ff7176ffeb0 14755->14775 14758 7ff7176dc530 14760 7ff7176dc567 HandleT Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock _Find_unchecked type_info::_name_internal_method 14758->14760 14759 7ff7178a20e0 Concurrency::cancellation_token::_FromImpl 8 API calls 14761 7ff7176d5b84 14759->14761 14760->14759 14762 7ff7176e95e0 14761->14762 14763 7ff7176e95f4 14762->14763 14764 7ff7176e9601 14762->14764 14823 7ff7177039c0 14763->14823 14764->14747 14767 7ff7178a20e9 14766->14767 14768 7ff7176d5bb9 14767->14768 14769 7ff7178a2160 IsProcessorFeaturePresent 14767->14769 14770 7ff7178a2178 14769->14770 14848 7ff7178a2358 RtlCaptureContext 14770->14848 14776 7ff7176ffef8 Concurrency::details::WorkQueue::IsStructuredEmpty 14775->14776 14779 7ff7176d4790 14776->14779 14782 7ff717704320 14779->14782 14783 7ff717704338 allocator 14782->14783 14786 7ff7176d4730 14783->14786 14787 7ff7176d4745 _Find_unchecked 14786->14787 14793 7ff7176d4741 14786->14793 14788 7ff7176d4751 14787->14788 14789 7ff7176d475d 14787->14789 14804 7ff7176ffd30 14788->14804 14790 7ff7176d4774 14789->14790 14791 7ff7176d4768 14789->14791 14795 7ff7176ffd30 allocator 2 API calls 14790->14795 14796 7ff7176d4a10 14791->14796 14793->14758 14795->14793 14797 7ff7176d4a33 14796->14797 14800 7ff7176d4a38 14796->14800 14807 7ff717703510 14797->14807 14799 7ff7176ffd30 allocator 2 API calls 14801 7ff7176d4a43 14799->14801 14800->14799 14802 7ff7176d4a52 _invalid_parameter_noinfo_noreturn 14801->14802 14803 7ff7176d4a65 14801->14803 14802->14801 14802->14802 14803->14793 14812 7ff7178a1b34 14804->14812 14810 7ff7176e86e0 14807->14810 14809 7ff71770351e _CxxThrowException 14809->14800 14811 7ff7176e86fa std::bad_alloc::bad_alloc 14810->14811 14811->14809 14813 7ff7178a1b4e malloc 14812->14813 14814 7ff7176ffd43 14813->14814 14815 7ff7178a1b3f 14813->14815 14814->14793 14815->14813 14816 7ff7178a1b5e 14815->14816 14817 7ff7178a1b69 std::_Facet_Register 14816->14817 14819 7ff7178a2930 14816->14819 14822 7ff7178a2910 14819->14822 14821 7ff7178a293e _CxxThrowException 14822->14821 14825 7ff7177039d3 Concurrency::details::WorkQueue::IsStructuredEmpty Concurrency::task_continuation_context::task_continuation_context 14823->14825 14824 7ff717703a60 14824->14764 14825->14824 14827 7ff717712820 14825->14827 14830 7ff7176d73c0 14827->14830 14831 7ff7176d73d3 _Find_unchecked 14830->14831 14832 7ff7176d73e7 14831->14832 14833 7ff7176d73da 14831->14833 14835 7ff7176d7401 14832->14835 14841 7ff7176ffbd0 14832->14841 14839 7ff7178a1b70 14833->14839 14845 7ff7178a1b78 14835->14845 14838 7ff7176d73e4 14838->14824 14839->14838 14840 7ff7178a2d98 free 14839->14840 14842 7ff7176ffc34 14841->14842 14843 7ff7176ffc46 _invalid_parameter_noinfo_noreturn 14842->14843 14844 7ff7176ffc59 14842->14844 14843->14842 14843->14843 14844->14835 14846 7ff7178a1b70 14845->14846 14847 7ff7178a2d98 free 14845->14847 14846->14838 14846->14847 14849 7ff7178a2372 RtlLookupFunctionEntry 14848->14849 14850 7ff7178a218b 14849->14850 14851 7ff7178a2388 RtlVirtualUnwind 14849->14851 14852 7ff7178a212c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 14850->14852 14851->14849 14851->14850

                              Control-flow Graph

                              APIs
                              • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF7176FFD43,?,?,?,?,?,?,?,?,?,00007FF717704340), ref: 00007FF7178A1B4E
                              • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7178A1B64
                                • Part of subcall function 00007FF7178A2930: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF7178A2939
                                • Part of subcall function 00007FF7178A2930: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF7178A1B69,?,?,?,00007FF7176FFD43), ref: 00007FF7178A294A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::cancel_current_taskExceptionThrowmallocstd::bad_alloc::bad_alloc
                              • String ID:
                              • API String ID: 514126270-0
                              • Opcode ID: f8a4103838cfa4670266cde32cbc1b6d3760155078776d00e363d5b4da3d2167
                              • Instruction ID: 80bb79109ca133054718f8443d788b91a326ecb37fb44ac76100175a58490a10
                              • Opcode Fuzzy Hash: f8a4103838cfa4670266cde32cbc1b6d3760155078776d00e363d5b4da3d2167
                              • Instruction Fuzzy Hash: 75E0B601E1DA1B05FB39366114154B488500F98FB0E9C1734D93D096C3FD1CA47F4130

                              Control-flow Graph

                              APIs
                              • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF7176D5B0C
                                • Part of subcall function 00007FF7176DC530: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF7176DC5A6
                                • Part of subcall function 00007FF7176DC530: Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF7176DC5B5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Concurrency::details::EmptyQueue::StructuredWork
                              • String ID:
                              • API String ID: 2595383736-0
                              • Opcode ID: 576b010e4d79c71d416d7fa9ea3cde484612d8b2d44409d99271f6b5ee5e5ba0
                              • Instruction ID: 0cfec89f4b70503aa60ef4dfbb7fc83af084292efe72c7ad071b28339e276d49
                              • Opcode Fuzzy Hash: 576b010e4d79c71d416d7fa9ea3cde484612d8b2d44409d99271f6b5ee5e5ba0
                              • Instruction Fuzzy Hash: 86213932628F8981DA10EB15F49025AB7A1F7C9BD4F901126FACD43B2ADF3CD156CB10

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00007FF717703510: stdext::threads::lock_error::lock_error.LIBCPMTD ref: 00007FF717703519
                                • Part of subcall function 00007FF717703510: _CxxThrowException.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF7176D4A38), ref: 00007FF71770352A
                              • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00007FF7176D4772), ref: 00007FF7176D4A52
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExceptionThrow_invalid_parameter_noinfo_noreturnstdext::threads::lock_error::lock_error
                              • String ID:
                              • API String ID: 2622805724-0
                              • Opcode ID: 6374f793fb6f722ee5878ab83d7be588fd6d591f92a24dbc7afee8e052767654
                              • Instruction ID: 3ffe2e5fee3941018faaa0fb0289c477f5912a3caee1d4924f0a2e86ae7b0642
                              • Opcode Fuzzy Hash: 6374f793fb6f722ee5878ab83d7be588fd6d591f92a24dbc7afee8e052767654
                              • Instruction Fuzzy Hash: 44015662628F4181DA60AB18E48032FE794FB887B4F441631EADD43B99EF3CD5668B14

                              Control-flow Graph

                              APIs
                              • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF7176FFEF3
                                • Part of subcall function 00007FF7176D4790: allocator.LIBCONCRTD ref: 00007FF7176D47AB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::details::EmptyQueue::StructuredWorkallocator
                              • String ID:
                              • API String ID: 1755220593-0
                              • Opcode ID: b78befe849ce56f157e027da90f8e68232d6b693ab0334466e71ee11ad11378e
                              • Instruction ID: fae4002ca1f2da8a7a785840f93816868c6827cca04ffd9ffa902559d8ff5536
                              • Opcode Fuzzy Hash: b78befe849ce56f157e027da90f8e68232d6b693ab0334466e71ee11ad11378e
                              • Instruction Fuzzy Hash: 85015E36619F8482CA60DB0AF89011EB7A5F7C9BA4F504125FACE83B29DF3CD1618B00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 55 7ff7176d4790-7ff7176d47ab call 7ff717704320 57 7ff7176d47b0-7ff7176d47b4 55->57
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: allocator
                              • String ID:
                              • API String ID: 3447690668-0
                              • Opcode ID: c46cd13c757347ee5ae45a1ac98d4f5a8e92b1abd091d4f9b2d6aefa4f4cafc4
                              • Instruction ID: c95bbc4ef661b5b39e91720b6720392c4d19d7ac41c045d81bcd561b75d95956
                              • Opcode Fuzzy Hash: c46cd13c757347ee5ae45a1ac98d4f5a8e92b1abd091d4f9b2d6aefa4f4cafc4
                              • Instruction Fuzzy Hash: 7DC0C976A29F8481CA04EB12F88100AB360F7C9BC1F90A421EA8E03729CF28C0598B00
                              APIs
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF7178A1ADB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CriticalInitializeSection$DebugDebuggerErrorLastOutputPresentString__vcrt_
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3055932891-631824599
                              • Opcode ID: 783119a43e65aac90d12e51b1c615accf096e0dfaa7eb4c44b9032a0703a7d66
                              • Instruction ID: 1c9cbe8167821c402a328cae8ecabc6bff16acfac1c37d1b32cf375d09c1d35b
                              • Opcode Fuzzy Hash: 783119a43e65aac90d12e51b1c615accf096e0dfaa7eb4c44b9032a0703a7d66
                              • Instruction Fuzzy Hash: 08118C32A14F5293E744AB22DA543B9B6A0FB44764F804035C60D42A92EF3CE5BEC720
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                              • String ID:
                              • API String ID: 2933794660-0
                              • Opcode ID: 4e2d1bd58a9d8448902597674e7da3e3367d4cfbcb8d42016aa474c77cdf1e72
                              • Instruction ID: c99e053f82efbda5e9a82537fb2a0502caaa9778ddffb93bb75324f0380a0790
                              • Opcode Fuzzy Hash: 4e2d1bd58a9d8448902597674e7da3e3367d4cfbcb8d42016aa474c77cdf1e72
                              • Instruction Fuzzy Hash: 70113622B24F068AEB009F60E8542B877B4FB19B68F840A31DA6D427A5DF7CD5698350
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: FormatInfoLocaleMessage
                              • String ID: !x-sys-default-locale
                              • API String ID: 4235545615-2729719199
                              • Opcode ID: ae7cb96a73b823519f046e9a82413b3af816002884d7848d87413d8fa98ec08b
                              • Instruction ID: ec6a5304d57c231623a64a8aa2d7438258374af6585055136a4e322bf64397b0
                              • Opcode Fuzzy Hash: ae7cb96a73b823519f046e9a82413b3af816002884d7848d87413d8fa98ec08b
                              • Instruction Fuzzy Hash: A701C471F0CF8182E7119B51B4007BAABA1F788BE4F844135DA4947B9ADF3CD51AC710
                              APIs
                                • Part of subcall function 00007FF7178A1E70: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF7176FEF0E,?,?,?,?,00007FF7176E81DE,?,?,?,?,00007FF7175C1050), ref: 00007FF7178A1E80
                              • GetProcessHeap.KERNEL32(?,?,?,?,00007FF7176E81DE,?,?,?,?,00007FF7175C1050), ref: 00007FF7176FEEAF
                                • Part of subcall function 00007FF7178A1E04: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF7176FEF53,?,?,?,?,00007FF7176E81DE,?,?,?,?,00007FF7175C1050), ref: 00007FF7178A1E14
                                • Part of subcall function 00007FF7178A1E04: ReleaseSRWLockExclusive.KERNEL32(?,?,?,00007FF7176FEF53,?,?,?,?,00007FF7176E81DE,?,?,?,?,00007FF7175C1050), ref: 00007FF7178A1E54
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ExclusiveLock$Acquire$HeapProcessRelease
                              • String ID:
                              • API String ID: 3865638231-0
                              • Opcode ID: 71a3de95a5db07dcad1cd2507a2d500c210894f8145dd710bfa4608815be444e
                              • Instruction ID: 6c1f14eb2986500f3730d2f481b302b1aad433a01d8b2ccb327fbd1dae32e773
                              • Opcode Fuzzy Hash: 71a3de95a5db07dcad1cd2507a2d500c210894f8145dd710bfa4608815be444e
                              • Instruction Fuzzy Hash: 9021CE24E19E1396EB00F714EC611B4AB75EF94B61FC05132D40E422A3DE2CEA5EC764
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 741ea51273af6ced77d8204fa0c22d04b1cf6953300260873340e5f8a9195d54
                              • Instruction ID: 6f8f186aea73e60c4ed80b53fee2f2b6c74dd37f06260d5ee28c8e1777c6041e
                              • Opcode Fuzzy Hash: 741ea51273af6ced77d8204fa0c22d04b1cf6953300260873340e5f8a9195d54
                              • Instruction Fuzzy Hash: 8182B036219AC58ADB70CB19E4907AEB7A1F3C8B94F544126EACD83B59CE3CD555CF00

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 109 7ff7176da5d0-7ff7176da629 ?width@ios_base@std@@QEBA_JXZ 110 7ff7176da65b-7ff7176da664 109->110 111 7ff7176da62b-7ff7176da659 ?width@ios_base@std@@QEBA_JXZ 109->111 113 7ff7176da699-7ff7176da6c1 call 7ff7176e90e0 call 7ff7176eb300 110->113 111->110 112 7ff7176da666-7ff7176da694 ?width@ios_base@std@@QEBA_JXZ 111->112 112->113 118 7ff7176da6d3-7ff7176da701 ?flags@ios_base@std@@QEBAHXZ 113->118 119 7ff7176da6c3-7ff7176da6ce 113->119 121 7ff7176da7c2-7ff7176da7c7 118->121 122 7ff7176da707 118->122 120 7ff7176da920-7ff7176da991 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z call 7ff7176ea290 call 7ff7178a20e0 119->120 124 7ff7176da833 121->124 125 7ff7176da7c9-7ff7176da821 ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z 121->125 126 7ff7176da716-7ff7176da71c 122->126 130 7ff7176da842-7ff7176da848 124->130 125->124 129 7ff7176da823-7ff7176da82e 125->129 126->121 127 7ff7176da722-7ff7176da7ae ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z call 7ff717738ab0 call 7ff717738b00 126->127 143 7ff7176da7b0-7ff7176da7bb 127->143 144 7ff7176da7bd 127->144 133 7ff7176da8ee-7ff7176da91e ?width@ios_base@std@@QEAA_J_J@Z 129->133 130->133 134 7ff7176da84e-7ff7176da8da ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z call 7ff717738ab0 call 7ff717738b00 130->134 133->120 145 7ff7176da8dc-7ff7176da8e7 134->145 146 7ff7176da8e9 134->146 143->121 144->126 145->133 146->130
                              APIs
                              • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF7176DA620
                              • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF7176DA64B
                              • ?width@ios_base@std@@QEBA_JXZ.MSVCP140 ref: 00007FF7176DA686
                              • ?flags@ios_base@std@@QEBAHXZ.MSVCP140 ref: 00007FF7176DA6F3
                              • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF7176DA742
                              • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ.MSVCP140 ref: 00007FF7176DA76D
                              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7176DA781
                              • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF7176DA7E9
                              • ?sputn@?$basic_streambuf@_WU?$char_traits@_W@std@@@std@@QEAA_JPEB_W_J@Z.MSVCP140 ref: 00007FF7176DA809
                              • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF7176DA86E
                              • ?fill@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADXZ.MSVCP140 ref: 00007FF7176DA899
                              • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140 ref: 00007FF7176DA8AD
                              • ?width@ios_base@std@@QEAA_J_J@Z.MSVCP140 ref: 00007FF7176DA917
                              • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7176DA94E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: U?$char_traits@_$D@std@@@std@@U?$char_traits@$?width@ios_base@std@@W@std@@@std@@$?rdbuf@?$basic_ios@_V?$basic_streambuf@_W@std@@@2@$?fill@?$basic_ios@?sputc@?$basic_streambuf@$?flags@ios_base@std@@?setstate@?$basic_ios@?sputn@?$basic_streambuf@_
                              • String ID:
                              • API String ID: 3628490770-0
                              • Opcode ID: 9f70a5b17ca0f15cc1049185e283ac8fd5907c399e60a8d025d402138028276d
                              • Instruction ID: a4884503ab7d792ce2e03a81494d136860cd7097889fea5da9802b6e372536d2
                              • Opcode Fuzzy Hash: 9f70a5b17ca0f15cc1049185e283ac8fd5907c399e60a8d025d402138028276d
                              • Instruction Fuzzy Hash: 91A1D726A1DF8586DB70EB15E49036EB7A1FBC8B94F404036DA8E83B69DF3CD5158B10

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: type_info::_name_internal_method$char_traits$Concurrency::details::EmptyQueue::StructuredWork
                              • String ID: ; expected $; last read: '$syntax error $unexpected $while parsing
                              • API String ID: 3012117132-4239264347
                              • Opcode ID: a5dc54af2d110ee15b9334c1b336f1c85abe22bcc17acc6ed72fc8297cf45f24
                              • Instruction ID: 98ee026a1f38d5f6e444b387f4d000df66fbf29567315c626b690839c6910d6f
                              • Opcode Fuzzy Hash: a5dc54af2d110ee15b9334c1b336f1c85abe22bcc17acc6ed72fc8297cf45f24
                              • Instruction Fuzzy Hash: 8191D57250DFC581DAA0EB15E4903EAB7A5FB84750F804532EA8D43BAADF2CD45ACB50

                              Control-flow Graph

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: type_info::_name_internal_method$ApisConcurrency::details::Concurrency::task_continuation_context::task_continuation_contextEmptyFac_nodeFac_node::_FileListQueue::StructuredWork___lc_codepage_func__std_fs_code_pagestd::_
                              • String ID: ", "$: "
                              • API String ID: 1700522703-747220369
                              • Opcode ID: 7cfcadc2253ab10c95d59581eebc5d8042cdd7e241ff29f6e7fafbed051b3339
                              • Instruction ID: cb19580ffdb48db5cdec53f2e7baa7a73bef28965fd31f686c840f81d89eb474
                              • Opcode Fuzzy Hash: 7cfcadc2253ab10c95d59581eebc5d8042cdd7e241ff29f6e7fafbed051b3339
                              • Instruction Fuzzy Hash: C761013261CA8691DA70EB11E8913EFE361FBC8794F800531EA8D87A5ADE7CD509CB50
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Func_class
                              • String ID: array$object$object key$object separator$value
                              • API String ID: 1670654298-2448007618
                              • Opcode ID: db5e975a570036553e7f94d44da9c56933bdf259cb22937827a301dce5654bd8
                              • Instruction ID: 221e00817d1a3a0c58b2228c204137a5e1458732f7b480dbf66bd71dbcd90850
                              • Opcode Fuzzy Hash: db5e975a570036553e7f94d44da9c56933bdf259cb22937827a301dce5654bd8
                              • Instruction Fuzzy Hash: 1552056260DFC185DAB0EB15E4902EEB3A5EBC5794F800122EACD57B5ADF2CD549CB20
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Func_class
                              • String ID: array$object$object key$object separator$value
                              • API String ID: 1670654298-2448007618
                              • Opcode ID: 30ffda3624d6424a67e43499c31331b4d80e8fde3fb8fef4d10a9750cdbf09ca
                              • Instruction ID: 07099a22193c203fbd0204c71358e408c98d0ca97ca8d84396730da0a287eef3
                              • Opcode Fuzzy Hash: 30ffda3624d6424a67e43499c31331b4d80e8fde3fb8fef4d10a9750cdbf09ca
                              • Instruction Fuzzy Hash: 2F52176260DFC185DAB0EB15E4902EEB3A5EBC5794F800136EACD57B5ADF2CC549CB20
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: _errno_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2959964966-0
                              • Opcode ID: dd6bd2d32ed0a4552d503deda97d75ee8b407b9f55deb67a79f7f18f5301eac7
                              • Instruction ID: bdd356f2ee83bd7942e6ddd9ba80bacba9f84ba780003b7e35fe7edbf1ec9c4a
                              • Opcode Fuzzy Hash: dd6bd2d32ed0a4552d503deda97d75ee8b407b9f55deb67a79f7f18f5301eac7
                              • Instruction Fuzzy Hash: 0B31017181CB45CAE721AF50E44436AFAA0F7887A4F801135EA8D42A95CF7DD59ECF31
                              APIs
                              • ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF7176E9A72), ref: 00007FF7177038FF
                              • ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF7176E9A72), ref: 00007FF71770390F
                              • ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF7176E9A72), ref: 00007FF717703921
                              • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF7176E9A72), ref: 00007FF717703931
                              • ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ.MSVCP140(?,?,?,?,?,?,?,?,00007FF7176E9A72), ref: 00007FF71770394C
                              • ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z.MSVCP140(?,?,?,?,?,?,?,?,00007FF7176E9A72), ref: 00007FF717703981
                              • ?setp@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD0@Z.MSVCP140(?,?,?,?,?,?,?,?,00007FF7176E9A72), ref: 00007FF717703991
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: D@std@@@std@@U?$char_traits@$?eback@?$basic_streambuf@$?egptr@?$basic_streambuf@?epptr@?$basic_streambuf@?pptr@?$basic_streambuf@?setg@?$basic_streambuf@?setp@?$basic_streambuf@D00@
                              • String ID:
                              • API String ID: 2626452370-0
                              • Opcode ID: 185698c16b04f3af74c471cbd5ae4026bdc4d43d4a3e66adb1fa6317d3853b89
                              • Instruction ID: 83b5eea165b05c5ab4d9f4f11df88fc879a7972f74f1b72dca85bed34f633aa4
                              • Opcode Fuzzy Hash: 185698c16b04f3af74c471cbd5ae4026bdc4d43d4a3e66adb1fa6317d3853b89
                              • Instruction Fuzzy Hash: ED21E536629E4186DB10EB55E85062AF7A0FBC8BA4F400135EE8D83725DF7CD419CB10
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Decorator::getTableTypebool_shared_ptr$Concurrency::details::EmptyQueue::StructuredWork
                              • String ID:
                              • API String ID: 2631667939-0
                              • Opcode ID: 6a7545cfe1b610ce745b30f18c353a4de252b4bffb2beafc8b9a099a3b72e1a9
                              • Instruction ID: 6d856ea5911e39be3f58bc2362685fe177e09062755c2db15a80628fad80b7b0
                              • Opcode Fuzzy Hash: 6a7545cfe1b610ce745b30f18c353a4de252b4bffb2beafc8b9a099a3b72e1a9
                              • Instruction Fuzzy Hash: D6D10D3260CEC690DA71EB15E4913EAA361FBD9750F804432DACD47BABDE6CD54D8B20
                              APIs
                                • Part of subcall function 00007FF7176E9080: ?_Ipfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA_N_N@Z.MSVCP140 ref: 00007FF7176E90BA
                              • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF7176DFB3B
                              • ?sgetc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7176DFB44
                              • ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140 ref: 00007FF7176DFBF8
                              • ?sbumpc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHXZ.MSVCP140 ref: 00007FF7176DFC01
                              • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140 ref: 00007FF7176DFCAC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: D@std@@@std@@U?$char_traits@U?$char_traits@_$?rdbuf@?$basic_ios@_V?$basic_streambuf@_W@std@@@2@W@std@@@std@@$?sbumpc@?$basic_streambuf@?setstate@?$basic_ios@?sgetc@?$basic_streambuf@Ipfx@?$basic_istream@
                              • String ID:
                              • API String ID: 436491974-0
                              • Opcode ID: c49e1b7a0487597d69a27c8c4d730118aa05dbd207d796b72402560918768041
                              • Instruction ID: daafeaf4d6a2d66413969fae35ea68b94a863e332e57001cf2115751b29abc47
                              • Opcode Fuzzy Hash: c49e1b7a0487597d69a27c8c4d730118aa05dbd207d796b72402560918768041
                              • Instruction Fuzzy Hash: F451417261CA8185DB70EB15E49027EF7A0FBC8B94F804435EACD87766DE3CD51A8B20
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: _errno_invalid_parameter_noinfo
                              • String ID:
                              • API String ID: 2959964966-0
                              • Opcode ID: 33e67c687726017ec922af3165dd94ef506de64be0c18755618cffadda7841a0
                              • Instruction ID: 06b93162029880aaec395418d3300f7a31c0f9954ac0beec1e2b56341dd4d44a
                              • Opcode Fuzzy Hash: 33e67c687726017ec922af3165dd94ef506de64be0c18755618cffadda7841a0
                              • Instruction Fuzzy Hash: 4A310C7291CB4686E721AB14E44432AF6E4F78C7A4F500135EA8D42A99CF7CE49ECF20
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Lockit@std@@$??0_??1_Bid@locale@std@@Getcat@?$codecvt@GetfacetMbstatet@@@std@@V42@@Vfacet@locale@2@std::locale::_
                              • String ID:
                              • API String ID: 930135289-0
                              • Opcode ID: 60e422734b0b0876130bd5e3988b4cc4bf4b6618fe5ac51d24d2c6d2df6d8229
                              • Instruction ID: cb35e6bc80edea89cced31e52bf6c6720ae21bff550081d37b54820281f7120d
                              • Opcode Fuzzy Hash: 60e422734b0b0876130bd5e3988b4cc4bf4b6618fe5ac51d24d2c6d2df6d8229
                              • Instruction Fuzzy Hash: 9C31122651DE4582DA10EB15E89016AF771FBC97A4F900131EA8D43BAADF3CD55ACB10
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::details::_CriticalHandleLock::_ReentrantScoped_lockScoped_lock::~_type_info::_name_internal_method
                              • String ID: <U+%.4X>
                              • API String ID: 1503085150-1919636860
                              • Opcode ID: d7689c8780e7e9517fd381439f4adfe240bb0a6583ab39670c4d4a601100ede1
                              • Instruction ID: c49a23cb914d70973a106d07b4eb79fdedf03e12a845a0e5d26a5f520c59ca8d
                              • Opcode Fuzzy Hash: d7689c8780e7e9517fd381439f4adfe240bb0a6583ab39670c4d4a601100ede1
                              • Instruction Fuzzy Hash: D8314D3251CE8185D660EB11F89126EFBA0FBC87A0F904531EACD87B6ADE2CD559CB10
                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::cancellation_token::_FromImpl
                              • String ID: at line $, column
                              • API String ID: 2278334151-191570568
                              • Opcode ID: 0b0476e683444410c06c89faf219409f412737b45ccb73666e32d8119b3c7eb2
                              • Instruction ID: 252f728fa8b4470b90a1383c2962231d705316a999b9532be9bf0fea94d78a3d
                              • Opcode Fuzzy Hash: 0b0476e683444410c06c89faf219409f412737b45ccb73666e32d8119b3c7eb2
                              • Instruction Fuzzy Hash: 2A310572609F8582DA60EB15F88029AF7A5FBC8794F504122EACD43B6ADF3CC559CB50
                              APIs
                              • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF7176E6DC4
                              • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF7176E6F85
                              • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF7176E6F9A
                                • Part of subcall function 00007FF71779CDD0: Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF71779CDED
                                • Part of subcall function 00007FF71779CDD0: _Max_value.LIBCPMTD ref: 00007FF71779CE12
                                • Part of subcall function 00007FF71779CDD0: _Min_value.LIBCPMTD ref: 00007FF71779CE40
                              • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF7176E70DC
                                • Part of subcall function 00007FF717704180: ?_Xlength_error@std@@YAXPEBD@Z.MSVCP140(?,?,?,?,00007FF7176D50B5), ref: 00007FF71770418B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::details::EmptyQueue::StructuredWork$Max_valueMin_valueXlength_error@std@@
                              • String ID:
                              • API String ID: 4007518583-0
                              • Opcode ID: 0f077840f1ac01a53fb5d9f445c245d8c4bb494e84aab70f3904c119a19f714d
                              • Instruction ID: 7e6f7081b9c768cd79bfc8303eaa4d5e0bddab75712bcee722f2fc198b3c3e58
                              • Opcode Fuzzy Hash: 0f077840f1ac01a53fb5d9f445c245d8c4bb494e84aab70f3904c119a19f714d
                              • Instruction Fuzzy Hash: 16B11C2261DFC581DA60EB16E4903ABE7A1F7C9BD0F400036EACD43B6ADF2CD5598B10
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast
                              • String ID:
                              • API String ID: 1717984340-0
                              • Opcode ID: ecec202655f9c531599374b38fcc20988f0c2ce1ba8e6c9c4af8467a9ed67bab
                              • Instruction ID: 15f4b8d428c17018f7f84b406b162b089fb2a7a7708c4f827b3cdf4321aaa7c7
                              • Opcode Fuzzy Hash: ecec202655f9c531599374b38fcc20988f0c2ce1ba8e6c9c4af8467a9ed67bab
                              • Instruction Fuzzy Hash: 25514632618A808AD760DB05E49039AFBB1F7C9BA4F604125EACC83B99DF7DD4498F40
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: __std_fs_convert_wide_to_narrow$Concurrency::details::EmptyExceptionListQueue::StructuredThrowWorkstd::make_error_code
                              • String ID:
                              • API String ID: 473158611-0
                              • Opcode ID: 8c4fd6d1689670e3fa4bf0a2fbe0c1002703dfa7d8f897caa6212ac84a87bdcc
                              • Instruction ID: afdf606e1ea213f9f18acb7a384941f61435318b9867a4c3b00857d376224082
                              • Opcode Fuzzy Hash: 8c4fd6d1689670e3fa4bf0a2fbe0c1002703dfa7d8f897caa6212ac84a87bdcc
                              • Instruction Fuzzy Hash: A831EA32929A818AD760EB11E48176EB7A1FBC9790F501035EACD87A5ACE3CD4198F50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: __std_fs_convert_narrow_to_wide$Concurrency::details::EmptyExceptionListQueue::StructuredThrowWorkstd::make_error_code
                              • String ID:
                              • API String ID: 3467093758-0
                              • Opcode ID: f1c37221971197ef2e6fe997a5e6e49ba08a93edbf11d59a9802932ff8400463
                              • Instruction ID: a23ee685c4d3ae475b9a076d2304f7c64eab50f3ab6959b308d1dfda19b0dd8d
                              • Opcode Fuzzy Hash: f1c37221971197ef2e6fe997a5e6e49ba08a93edbf11d59a9802932ff8400463
                              • Instruction Fuzzy Hash: AC310B3292DA818AD760EB21E84176FF7A0FBC9790F501135EA8D83B5ACE3CD4198F50
                              APIs
                                • Part of subcall function 00007FF7176E8390: ?rdbuf@?$basic_ios@_WU?$char_traits@_W@std@@@std@@QEBAPEAV?$basic_streambuf@_WU?$char_traits@_W@std@@@2@XZ.MSVCP140(?,?,?,?,?,?,00007FF7176E90FD), ref: 00007FF7176E83D2
                              • ?good@ios_base@std@@QEBA_NXZ.MSVCP140 ref: 00007FF7176E9118
                              • ?tie@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBAPEAV?$basic_ostream@DU?$char_traits@D@std@@@2@XZ.MSVCP140 ref: 00007FF7176E914A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: U?$char_traits@U?$char_traits@_$?good@ios_base@std@@?rdbuf@?$basic_ios@_?tie@?$basic_ios@D@std@@@2@D@std@@@std@@V?$basic_ostream@V?$basic_streambuf@_W@std@@@2@W@std@@@std@@
                              • String ID:
                              • API String ID: 770597929-0
                              • Opcode ID: 258c187f890d08a1e9fc0ca30172c85fc87cdba7641fff0cb397c093e47e2444
                              • Instruction ID: cb7f0dd13c717193b21fc05a59b8ffe5fdb98a8dbba5d2f5256e44d5a0891668
                              • Opcode Fuzzy Hash: 258c187f890d08a1e9fc0ca30172c85fc87cdba7641fff0cb397c093e47e2444
                              • Instruction Fuzzy Hash: 6221F826A09F8585DF11DB0AE48422EABB0FBCAB98F508026EB8D43765DF3DC455C720
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide
                              • String ID:
                              • API String ID: 203985260-0
                              • Opcode ID: e49e580475eb105ab438402875f7e769b0585cb18dcc6b3ad0ebc97820afbe23
                              • Instruction ID: b668939f639680601462d29bc29a3925cf25c469c65484d650662cf5150d1224
                              • Opcode Fuzzy Hash: e49e580475eb105ab438402875f7e769b0585cb18dcc6b3ad0ebc97820afbe23
                              • Instruction Fuzzy Hash: A4214772E28B8187E7209F15A44432EBAB4FB89FD0F640139EB8993B55DF3CD4168B10
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Func_class
                              • String ID:
                              • API String ID: 1670654298-0
                              • Opcode ID: e77f79d9cf39988b35128cb69f5d17508d7ad36d8d49692ac75ebe8530a279bd
                              • Instruction ID: ab5bca962e2ef704315d7314070e2f162bcaecee4e5c99e586ddc744c0a04a06
                              • Opcode Fuzzy Hash: e77f79d9cf39988b35128cb69f5d17508d7ad36d8d49692ac75ebe8530a279bd
                              • Instruction Fuzzy Hash: 0911EC2260DE4180DA10FB16EC5112FE7A0FBCABD1F904035FE8D87B6ADE2DD44A8B10
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: shared_ptr$allocator
                              • String ID:
                              • API String ID: 426846764-0
                              • Opcode ID: fe7b6fd1f7e30fa00660d5006c6cb6fedca7224268ee6b27a83a09b9491fca5c
                              • Instruction ID: a5fe64ca8447460fd26816100f534282f1038b72ae329e40f026e0919e14c01e
                              • Opcode Fuzzy Hash: fe7b6fd1f7e30fa00660d5006c6cb6fedca7224268ee6b27a83a09b9491fca5c
                              • Instruction Fuzzy Hash: 15114832618E8181DE60EB15F4412AFB362FBC47D0F804131EACD57B5ADE2CC55A8B20
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Find_uncheckedHandle
                              • String ID:
                              • API String ID: 1005945929-0
                              • Opcode ID: eec8d121c8286cafcff43c719952123da7a1a0ff476df82a5753a9bbffeecc93
                              • Instruction ID: dedc8491e077f3b868bb8ac225c805ad85a7bd9ba0e8c033858575b5bae9c1f8
                              • Opcode Fuzzy Hash: eec8d121c8286cafcff43c719952123da7a1a0ff476df82a5753a9bbffeecc93
                              • Instruction Fuzzy Hash: 97F0E12252DE4181DA50FB11F49106EE765FBC87E0F800535FACE83B5BDE6CD5598B50
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$Find_uncheckedHandle
                              • String ID:
                              • API String ID: 1005945929-0
                              • Opcode ID: 291345dabd49c7083a4d0a6fd68b288ae2a2360adec0d06b4a22fb5c96f750aa
                              • Instruction ID: 5f8b96bcfef1bba8110bd139fe7beaf68fc15626207308194e108cf5cd40d296
                              • Opcode Fuzzy Hash: 291345dabd49c7083a4d0a6fd68b288ae2a2360adec0d06b4a22fb5c96f750aa
                              • Instruction Fuzzy Hash: 92F02C6252DE8181DA50EB11E89106FE7A1FBC87E0F400035FACE87B6BDE6CC0598B50
                              APIs
                              • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF7176DAB78
                              • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF7176DAB87
                              • Concurrency::details::_CriticalNonReentrantLock::_Scoped_lock::~_Scoped_lock.LIBCMTD ref: 00007FF7176DAB96
                              • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF7176DEF75), ref: 00007FF7176DABBD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::details::_CriticalLock::_ReentrantScoped_lockScoped_lock::~_$memcmp
                              • String ID:
                              • API String ID: 2606901649-0
                              • Opcode ID: 694c53b12d12f6eba441c196b00874dfc9c15d4e7ec539bb03d53240b683f1a5
                              • Instruction ID: 4e56d81bfff5b589541eee46458db02f9ba3f9dfddd6f07a96977d5e343bac2d
                              • Opcode Fuzzy Hash: 694c53b12d12f6eba441c196b00874dfc9c15d4e7ec539bb03d53240b683f1a5
                              • Instruction Fuzzy Hash: BEF09762529F8485CA10EB55F49105EB7A5F7D87D4F500129E6CD83B6ADF2CD2258B40
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: object key$object separator
                              • API String ID: 0-2279923633
                              • Opcode ID: a8f2c7678eb8f3b54bc150a978054d1c7856fc2a79208d43f394fedce2280f94
                              • Instruction ID: 558613ca8d11a6c42600af11bfcfcee5574be44bc26d50d1ae5b4fb282da8310
                              • Opcode Fuzzy Hash: a8f2c7678eb8f3b54bc150a978054d1c7856fc2a79208d43f394fedce2280f94
                              • Instruction Fuzzy Hash: 3DC1086250DEC184DA70EB15E4513EEF3A1EB85794F800132EACD57B9ADF2CD549CB60
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID:
                              • String ID: object key$object separator
                              • API String ID: 0-2279923633
                              • Opcode ID: 1e970a03f6bfa36e8a92cf90c08ce7a5caa9367753a1c01c580f077706461c82
                              • Instruction ID: 0a1a3b32dc7046da529965d23995bd3a96c0b6d8dca087e8f411036683541f24
                              • Opcode Fuzzy Hash: 1e970a03f6bfa36e8a92cf90c08ce7a5caa9367753a1c01c580f077706461c82
                              • Instruction Fuzzy Hash: A9C1266260DEC184DA70EB15E4513EEB7A1EBC5794F800132EACD57B9BDF2CD44A8B60
                              APIs
                                • Part of subcall function 00007FF71779EB00: Concurrency::cancellation_token::_FromImpl.LIBCPMTD ref: 00007FF71779EB2D
                                • Part of subcall function 00007FF71779EB00: Concurrency::cancellation_token::_FromImpl.LIBCPMTD ref: 00007FF71779EB65
                                • Part of subcall function 00007FF7176E6CD0: char_traits.LIBCPMTD ref: 00007FF7176E6CFD
                              • Concurrency::details::WorkQueue::IsStructuredEmpty.LIBCMTD ref: 00007FF71770F930
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: Concurrency::cancellation_token::_FromImpl$Concurrency::details::EmptyQueue::StructuredWorkchar_traits
                              • String ID: parse error$parse_error
                              • API String ID: 3940763495-1820534363
                              • Opcode ID: 225d94126315b9ff481c257670acb08f044ef1bb55069bb0d9d9c434ea7b6b3d
                              • Instruction ID: 9372cca973403f69effb7a78c80f5f79b7246ae9729b933201e2cb66de43ef91
                              • Opcode Fuzzy Hash: 225d94126315b9ff481c257670acb08f044ef1bb55069bb0d9d9c434ea7b6b3d
                              • Instruction Fuzzy Hash: 8D51F532509FC591DAA0EB15E4903EAF3A5FBC9794F804122E6CC43B6ADF2CD55ACB50
                              APIs
                              • ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z.MSVCP140 ref: 00007FF717700EF1
                              • fwrite.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF717700F60
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2600397583.00007FF7175C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7175C0000, based on PE: true
                              • Associated: 00000000.00000002.2600376378.00007FF7175C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600639862.00007FF7178A8000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600705443.00007FF71795A000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2600727416.00007FF71795C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_7ff7175c0000_SecuriteInfo.jbxd
                              Similarity
                              • API ID: ?unshift@?$codecvt@Mbstatet@@Mbstatet@@@std@@fwrite
                              • String ID:
                              • API String ID: 1347553915-3916222277
                              • Opcode ID: 94081bf84289e140f870bed1d50639b63d428586c365cbc78b24cb85a2ac98e2
                              • Instruction ID: 4f423316eaca842a81c06b6a6719665bc18cbff7654deca5eb4283f864ecafef
                              • Opcode Fuzzy Hash: 94081bf84289e140f870bed1d50639b63d428586c365cbc78b24cb85a2ac98e2
                              • Instruction Fuzzy Hash: E6415C3651CB8189DB61EB15E4843AAB7A0F7CA760F501036EA8D43B6ACF3CE44DDB50